• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (10): 1850-1855.

• 论文 • Previous Articles     Next Articles

Security authentication of the modified NeedhamSchroeder
protocol based on  logic of event   

LIU Xinqian,XIAO Meihua,CHENG Daolei,MEI Yingtian,LI Wei   

  1. (School of Software,East China Jiao Tong University,Nanchang 330013,China)
  • Received:2015-08-19 Revised:2015-09-30 Online:2015-10-25 Published:2015-10-25

Abstract:

Security protocols are the foundation of modern secure networked systems. Proving the security properties of cryptographic protocols is a challenge. Logic of event  is a formal method for describing the state migration of a distributed system, which formally describes security protocols, and which is the basis of theorem proving. Using the language of event orderings, event classes, and a type of atoms representing random numbers, keys,signatures, and ciphertexts, we present a theory in which authentication protocols can be formally defined and strong authentication properties proven. The improved NeedhamSchroeder protocol with time stamp, is proved to be of good security by our theory. The thoery can also be applied to formal analysis and verification of similar security protocols.

Key words: logic of event;modified Needham-Schroeder protocol;formal method;strong authentication theory