Loading...
Welcome to Journal of University of Chinese Academy of Sciences,Today is

Current Issue

2002, Vol.19, No.3 Previous Issue    Next Issue
Design of Wireless PKI
SUN Lin-Hong, YE Ding-Feng, FENG Deng-Guo
2002, 19 (3): 223-228.  DOI: 10.7523/j.issn.2095-6134.2002.3.001
Abstract ( 1141 ) PDF (KB) ( 0 )

Studies the structure of wireless PKI, and designs the system of certificate, wtls protocol, wap secure gateway and the interface of wim.

Cryptanalysis of a Remote Password Authentication Scheme
FANG Gen-Xi, DAI Zong-Duo, YANG Jun-Hui
2002, 19 (3): 229-232.  DOI: 10.7523/j.issn.2095-6134.2002.3.002
Abstract ( 1649 ) PDF (KB) ( 0 )

This paper analyzes the security of Tan's scheme for remote password authentication based on cross-product. We point out that to impersonate one user's log-in reguest, the intruders need only to know the user's two log-in requests, or need only to know one log-in request after booking a smart card and getting some useful information from it, so the scheme is not secure. Some modifications to Tan's scheme for avoiding the above two kinds of possible attacks are given.

Formal Specification of Cryptographic Protocols Using PVS
HU Cheng-Jun, ZHENG Yuan, LU Shu-Wang, SHEN Chang-Xiang
2002, 19 (3): 233-239.  DOI: 10.7523/j.issn.2095-6134.2002.3.003
Abstract ( 1424 ) PDF (KB) ( 0 )

A specification method using PVS is presented. Higher order logic is chosen as the specification language. Strong spy and ideal encryption are assumed, and trace model is used to define protocols' behaviors. Moreover, useful structures such as message, event, protocol rule, etc. are semantically encoded.

A Mixed Formal Analysis Technology of Security Protocols
FAN Hong, FENG Deng-Guo
2002, 19 (3): 240-245.  DOI: 10.7523/j.issn.2095-6134.2002.3.004
Abstract ( 1178 ) PDF (KB) ( 0 )

The advantages and disadvantages of model checking technology and logic reasoning technology is analyzed, Based on it, the author gives a specification of the new mixed technology of the two technologies which can provide a more complete formal analysis of security protocols.

Security Requirements on Authentication Protocols Using Challenge-Response
LAI Xue-Jia
2002, 19 (3): 246-253.  DOI: 10.7523/j.issn.2095-6134.2002.3.005
Abstract ( 1094 )

Security requirements for a challenge-response mutual authentication protocol are formulted as seven simple necessary conditions. Each of these conditions is related to an attack so that a protocol not fulfilling all the conditions will be vulnerable to one of the attacks. Two protocols are idetified such that they contain minimal number of necessary security parmeters.

An Improvement of the TMN Protocol Based on Trapdoor Oneway Functions
SUN Hai-Bo, LIN Dong-Dai
2002, 19 (3): 254-262.  DOI: 10.7523/j.issn.2095-6134.2002.3.006
Abstract ( 1105 ) PDF (KB) ( 0 )

In this paper, we have presented a general method to improve the security of TMN Protocol based on trap-door one-way functions. We also proved its security by using strand space theory and gave some examples of our improvement.

Specifying Security Protocols with ASM
XUE Rui, FENG Deng-Guo
2002, 19 (3): 263-270.  DOI: 10.7523/j.issn.2095-6134.2002.3.007
Abstract ( 342 ) PDF (KB) ( 2 )

The primary elements of Gurevich's Abstract State Machines(ASM)are introduced. A verification enviroment is proposed for analying of security protocols in ASM,and a general penetrator model is presented so that much of security properties could be dealed with. As a case, Helsinki protocol are specified in the model,a direct mathematical proof of its weakness is given.

A Secure Mathematical Computation Protocol
LIN Dong-Dai, SONG Zhi-Min, PAUL S. WANG
2002, 19 (3): 271-277.  DOI: 10.7523/j.issn.2095-6134.2002.3.008
Abstract ( 393 ) PDF (KB) ( 2 )

The Internet Accessible Mathematical Computation (IAMC) framework makes supplying/accessing mathematical computation easy on the Internet/Web. In this paper, the vulnerabilities of the current IAMC framework is discussed. A scheme for incorporating SSL/TLS protocol into the current Mathematical Computation Protocol is presented. The resulting secure Mathematical Computation Protocol can then provide crypto-graphic authentications, data privacy and integrity.

A Simple Type System with Security Level in π-calculus
WANG Li-Bin, CHEN Ke-Fei
2002, 19 (3): 278-281.  DOI: 10.7523/j.issn.2095-6134.2002.3.009
Abstract ( 454 ) PDF (KB) ( 2 )

A simple type system with security levels in π-calculus is proposed, and its type soundness is proved. This simple type. π-calculus with this type system can be used as a general formalism for secure systems or secure protocols analysis and specification.

Threshold Schemes Based on Plücker Coordinates
WANG Ming-Sheng, FENG Deng-Guo, WANG Gui-Lin
2002, 19 (3): 282-287.  DOI: 10.7523/j.issn.2095-6134.2002.3.010
Abstract ( 423 ) PDF (KB) ( 3 )

Plücker coordinates are important in pure mathematics. In this paper, we propose a new method for constructing secret share schemes based on plücker coordinates. We show that several usual linear secret sharing schemes are our scheme's particular examples.

Some Bounds on Security Protocol Analysis——Combining Model Checking and Strand Spaces
LIU Yi-Wen, LI Wei-Qin
2002, 19 (3): 288-294.  DOI: 10.7523/j.issn.2095-6134.2002.3.011
Abstract ( 388 ) PDF (KB) ( 2 )

Strand Spaces serve as a model of security protocol analysis. In this paper, the main characteristics of Strand Spaces are briefly introduced, and its advantages and disadvantages are presented. An algorithm of building an ideal model of a protocol is proposed, which is used to bound both the abilities of the penetrator and the number of concurrent protocol runs. Combining Model Checking and Strand Spaces, a method is proposed to use both the automatic reasoning mechanism of the Model Checking and the bounds on security protocol analysis to achieve effective analysis of security protocols, avoiding state explosion problems.

On the Improvement of BAN Logic Analysis
MENG Jiang-Tao, FENG Deng-Guo, HU Zheng-Yu
2002, 19 (3): 295-305.  DOI: 10.7523/j.issn.2095-6134.2002.3.012
Abstract ( 392 ) PDF (KB) ( 1 )

To solve the problems that BAN logic analysis tends to neglect the potential defect of "send again attack" for cryptographic protocols,is made some improvement to the new message judgement of logic postulate of BAN logic analysis, aiming at reducing the misleading probability of BAN logic

Formal Model and Security Analysis for Cryptographic Protocols in the Distributed Network Environment
FENG Bin
2002, 19 (3): 306-310.  DOI: 10.7523/j.issn.2095-6134.2002.3.013
Abstract ( 416 ) PDF (KB) ( 3 )

Due to the rapid growth of the Internet applications, varied cryptographic protocols, including thses complex protocols with many roles and many cryptographic primitives, have been widely used to achieved various secure requirements in the distributed system. In the large distributed network environment, due to the maximum number of participants involved and the complexcity of run conditions of the protocol, the security characterzation and analysis for protocols is very difficult and complicated. In this paper, we introduce a new algebra system called Cryptographic Protocol Algebra(CPA) that characterizes the algebraic properties of messages involved in the protocol with multiple cryptographic operations. Based on CPA, we propose a new formal model for general cryptographic protocols. And we specify run conditions and security properties of cryptographic protocols in the unbounded network environment by building a formal language. Based on our model, we characterize a coordinated attack mode to protocols, and discuss reduction techniques for the protocol security analysis. Finally we briefly describe a new automatic analysis process for cryptographic protocols.

Brief Commentary on AES Modes of Operation
LI Xian-Xian, HUAI Jin-Peng
2002, 19 (3): 311-323.  DOI: 10.7523/j.issn.2095-6134.2002.3.014
Abstract ( 378 ) PDF (KB) ( 4 )

A mode of operation is an algorithm that features the use of a block cipher to provide an information security service. In the process of calling modes for AES, NIST received 15 candidates. Author introduces the 15 Modes of Operation for AES and their design ideas and characteristics.

Key Technologies in Securities of Wireless Electric Business
WU Wen-Ling
2002, 19 (3): 324-333.  DOI: 10.7523/j.issn.2095-6134.2002.3.015
Abstract ( 368 ) PDF (KB) ( 3 )

This paper firstly presents a briefly survey on the security technologies in wireless communications. Then we focus on some important protocols which will be used in WPKI, especially the WEP algorithm in IEEE 802.11 and the Wireless Transport Layer Security (WTLS) in Wireless Application Protocol (WAP). We study realizations of these two protocols, compare their security features, and discuss their potential advances in applications.

Key Technologies in Securities of Wireless Electric Business
LU Pei-Zhong, PING Hu
2002, 19 (3): 334-341.  DOI: 10.7523/j.issn.2095-6134.2002.3.016
Abstract ( 350 ) PDF (KB) ( 3 )

This paper firstly presents a briefly survey on the security technologies in wireless communications Then we focus on some important protocols which will be used in WPKI algorithm in IEEE 802 Protocol(WAP).We.11 and the Wireless Transport Layer Security ( W'I'LS) inespecially the WEP Wireless Application study realizations of these two protocols, compare their security features, and discuss their potential advances in applications.