Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2003, Vol. 20 ›› Issue (4): 389-406.DOI: 10.7523/j.issn.2095-6134.2003.4.001

    Next Articles

Survey on Theories and Methods of Formal Analyses for Security Protocols

Feng Dengguo, Fan Hong   

  1. Institute of Software,Chinese Academy of Sciences,Beijing,100080,China
  • Received:2003-05-29 Online:2003-07-10

Abstract:

Theories and methods of formal analyses for security protocol are surveyed.A classfication and a system model of formal analyses is given, and three classes of formal analy sis methods(based on reasoning,based on attack, based on proof)and fo rmal languages used in formal analyses are commented in details.Also disscussed is a new challenge the methods of security pro tocol formal analy sis are facing. Corresponding comments on these theories and methods are also given during the discussion.Challenges formal analyses face are also proposed.

Key words: security protocol, security model, formal analysis, formal language

CLC Number: