How Scyther-Compromise Agreement formal safety analysis protocol

1, the ultimate aim is how to insecurity agreement to improve, enhance safety performance. When the process of encryption and authentication protocols relating to formal analysis validated the model by adding adversary (DY eCK strong security model and model), a communication process between the sender and the recipient might be disturbed the presence of an attacker, i.e. is an attack output. So our aim is not bare to verify the existing agreement does indeed exist attack point where one aspect. But by encrypting a different manner or the amount of generated entities to participate in the negotiation process.

2, common modification measures

     Scyterg tool itself two functions, one formal security vulnerabilities protocol encryption and authentication of safety analysis, the second is to improve safety by gradually adding authentication protocol conditional attributes. In the example of the introduction to the agreement made improvements to Needham_schroeder, first wrote this tonight -----

3, how to modify the protocol after formal feedback to the protocol design bulk source body

   

Guess you like

Origin www.cnblogs.com/xinxianquan/p/11074792.html