In this paper , three kinds of logic languages used in analyzing cryptographic protocols are primarily introduced , and studied in their advantages and weakness . combing the advantages , a new formal logic language is put forward to analyze electronic commerce protocols 在本文中,作者主要介绍了用于分析密码协议的三种逻辑语言,研究了它们的优缺点,然后结合其优点,提出了一种新的用于分析电子商务协议的形式化逻辑语言。
This method not only specifies the structure and dynamic properties but also evaluates the performance of cryptographic protocol ( mainly time delay and software complexity ) . ( 3 ) firing rules of timed petri nets and the definition and algorithm of timed reachable graph are given ( 3 )给出了时延petri网的引发规则、时间可达图定义和构造算法,并且介绍了时延petri网的两个基本分析方法:时间可达图(或可覆盖图)和状态方程。
Because of its compactness , fineness and unambiguity , formal analysis of cryptographic protocol has been an efficient and correct method step by step . the dissertation mainly discusses using formal methods for analysis and evaluation of cryptographic protocols based on timed petri nets ( tpn ) 形式化分析由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径,但是密码协议的形式化分析研究目前还不够深入,本文主要研究了基于时延petri网的密码协议分析和评估方法。
Modeling yahalom protocol - creating and putting out share secret bases on symmetry cryptography - in strand space , the security of this protocol is proved by a convenient method which founds on strand space theory . finally , herein this authentication method , we give some advices in cryptographic protocols design 本文给出了基于对称密码算法产生和发布共享秘密的yahalom协议的串空间模型,并运用基于串空间理论的一种简便认证方法对其安全性进行了验证,证明了该协议的正确性;并且针对这一认证方法,给出了安全协议设计的几点建议。
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.