Formal analysis of data compilation protocol

1, near the end of the agreement formalized data analysis finishing again

     Scyther formal analysis tools and software information tool manual can be found on the official website https: //people.cispa.io/cas.cremers/scyther/ \

     scyther formal protocol analysis published in the author GitHub https://github.com/cascremers/scyther

    In addition all formal analysis tool ( proverif , maudenpa , CryptoVerif , ProVerif , Tamarin, cryptoverif1.28 , AVISPA ) data and the corresponding tools you need to install plug-ins involved in finishing GitHub account https://github.com/SueKayTian/protocol- analysis-tool / (fork)

2, Errata:

      In the country relatively less use of formal analysis protocol security papers, the existence of a "formal OAuth2.0 security protocol analysis" published in Computer Engineering and the presence of an error in Table 3 Scyther security attributes Secrecy Secret Design 2016 should be written as otherwise Scyther tool can not explain to run the program

3, set forth in the classical literature ------ A Structured Operational Modelling Delov-Yao model of the Dolev-Yao Threat Model

 4, all information on the EtherNet / IP finishing all uploaded to my GitHub account https://github.com/SueKayTian

5, on EtherNet / IP source code can find themselves on GitHub

6, on EtherNet / IP devices to scan scripts and remote code execution can be found on the Baidu Cloud already Share

7, a list of literature on the use of Scyther software division agreement has been uploaded on Baidu cloud Find    

8, with the source code TLS1.3 protocol design (design)

clientHello structure

Select the cipher suite

Calculating a master key

Transmission of encryption encrypted_extensions (this extension is more independent of the encryption key agreement, in response to some other corresponding extensions)

Sent encrypted certificate

Sent encrypted certificate and an array of signature

 

TLS1.3 implement user manual

0.Requirements

1) Operating Environment Python3

2) the need to install additional library functions python bag, PyCrypto, PyCryptodome, cryptography

2.0) install command python3 -m pip install libname

2.0) In linux system, there is no packet to python3 secrets included by default in, as the test system in the linux, secrets need to be manually added to the package / usr / lib / python3 / site-pakages directory. Secrets package download path: https: //github.com/python/cpython/blob/3.7/Lib/secrets.py

3) (Optional) you need to install the latest openssl (version 1.1.0), generates its own public and private keys and signed certificates.

1.Usage

1) using the command server

python3 main.py

Proposed operation command according to use, it is recommended to set the host IP and port number (default: 127.0.0.1 4443), which is to choose 3

 

2) the client using the command

2.Certificate (optional)

1) customer base and server need to use openssl to generate their own private key, public key, signed certificate. Link: https://www.openssl.org/docs/manmaster/man

2) The client needs to be named: client.key client.csr client.crt

3) the server needs to be named: server.key server.csr server.crt

4) need to create a new folder in the same directory .ssh main.py and copy it to generate its directory file.

5) on the server side need to remove the original .ssh folder.

TLS1.3 source code implementation file can be found on GitHub

Guess you like

Origin www.cnblogs.com/xinxianquan/p/11229104.html