Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2004, Vol. 21 ›› Issue (3): 380-385.DOI: 10.7523/j.issn.2095-6134.2004.3.015

Previous Articles     Next Articles

Running-Mode Analysis of the Three-Party Cryptographic Protocol

LIU XiuYing1,3, ZHANG YuQing2,3, YANG Bo1, XING Ge2,3   

  1. 1. National Key Laboratory of ISN, Xidian University, Xi’an 710071, China;
    2. State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing 100039, China;
    3. National Computer Network Intrusion Protection Center, Chinese Academy of Sciences, Beijing 100039, China
  • Received:2003-05-16 Revised:2003-07-01 Online:2004-05-10

Abstract:

Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols. To test this method, we use it to analyze the Davis Swick protocol and successfully prove the security of protocol. Therefore, we can draw a conclusion that running mode analysis of three party cryptographic protocol is available.

Key words: cryptographic protocol, formal analysis, model checking, running-mode analysis

CLC Number: