Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2002, Vol. 19 ›› Issue (1): 91-96.DOI: 10.7523/j.issn.2095-6134.2002.1.013

Previous Articles     Next Articles

Invariant Generation Techniques in Cryptographic Protocol Analysis

FAN Hong1, FENG DengGuo1, GUO JinGeng2   

  1. 1. State Key Laboratory of Information Security,Graduate School, Chinese Academy of Sciences,Beijing 100039;
    2. Institute of Information Security, PLA University of Information Engineering,Zhengzhou 450004
  • Received:2001-09-19 Revised:2001-10-19 Online:2002-01-10

Abstract:

Formal methods for cryptographic protocol analysis has drawn attention in recent years This leads to a development of the generation and specification techniques of invariant Invariantis defined what messages an intruder can and cannot learn and can be used to prove authentication as well as secrecy results, appear to be central This paper introducls an overview of invariant in different systems, analyzes their relationships to each other, develops a simple taxonomy, and discuses some of the implications for future research.

Key words: cryptographic protocols, formal analysis, invariant

CLC Number: