• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science

Previous Articles     Next Articles

Security analysis of Nayak-T protocol
based on time stamp and private key signature

XIAO Mei-hua1,MEI Ying-tian1,2,LI Wei1,LI Ya-nan1,ZHONG Xiao-mei1,SONG Zi-fan1   

  1. (1.School of Software,East China Jiaotong University,Nanchang 330013;
    2.Chizhou Vocational and Technical College,Chizhou 247100,China)
     
  • Received:2017-07-10 Revised:2017-09-16 Online:2017-12-25 Published:2017-12-25

Abstract:

With the rapid development of information networks, cloud services step into people’s vision and the problems of information security in the cloud environment become a focus. Nayak protocol is a password authentication scheme based on the bidirectional authentication and session key agreement in the cloud environment. Targeting at man-in-the-middle attacks existing in Nayak protocol, we put forward an improved Nayak-T protocol. Nayak-T protocol adds in time stamp and changes their encryption ways inside message options to ensure the security of two-way communication through double encryption. We use the four channels parallel modeling method to model Nayak-T protocol and adopt SPIN to verify the security of this protocol. Analysis of modeling optimization strategies proves that the model testing that adopts static analysis, type checking and syntax reordering are most efficient. This method can be applied to the formal analysis and verification of similar complicated protocols.

 

 

Key words: Nayak protocol, Nayak-T protocol, model checking, private key signature, time stamp