"Establishing a protocol based on secret key Scyther Design" ------- finishing excerpt

The main innovation of this paper Amount: use Scyther software, and gradually add and verify security properties by establishing a protocol for keys unsafe, the eventual establishment of a secure secret key establishment protocol.

      Establishment protocol class by formal analysis software designed keys can improve protocol design efficiency and reduce errors in the design process designers think. In addition, this method will analyze the process of design and synthesis protocol of agreement with the termination condition protocol design the results depend on automated analysis tools. Thus, the protocol designed by the method of its safety, can be simultaneously verified formal analysis tools.

      This paper is the basis of comparison to explain the principles of the Scyther tool ----- but did not speak on the system protocol formal description,

       Before then repeated the concept I do not write omitted here.

     Scyther can be analyzed in parallel multi-protocol, can be analyzed related to the timing of the agreement (this time being I still have not met), can be multi-secret key facilities (PKIs) mode of, you can find a variety of attack of the agreement,

     Scyther software SPDL language using three methods: Verify that the given security declaration (certification confidentiality statement parameters or the confidentiality of the subject), automatically generated security statement (viability, non-single-shot consistency, as well as non-synchronous single shot data confidentiality), characterized by a complete description of the protocol analysis, i.e., each protocol description body feature, all execution of the protocol description body trace by trace class found potentially dangerous.

      Scyther around software security attributes: confidentiality and authenticity.

Guess you like

Origin www.cnblogs.com/xinxianquan/p/10943776.html