Discrimination between traditional Dolev-Yao model attacks and eCK strong security model

1, DY model is based on layered security protocols idea, first consider the behavior of the security agreement itself logic is flawed, then consider whether there are implementation problems.

        In the general protocol analysis, we in the security protocol verification, we assume the attacker does not have the ability to break the cipher algorithm, DY model that in mind the provisions of the attacker has the ability to eavesdrop (in the case the attacker is not aware of the main agreement to intercept network news ,, case the attacker is not aware of the main agreement and storage network news ,, attacker can fake a message, an attacker could send a message, the attacker may most participants involved in the legal agreement protocols running ). Generally speaking DY model, the attacker has the ability to completely control the entire network,

      DY model gives the attacker the ability to define, but did not give specific rules say the execution order behavior, message forgery methods, how to become a legal agreement and other participants, so the modeling is difficult to accurately DY model to achieve, that is to say DY model in each of the security analysis tool is embodied there are differences.

Dolev-Yao model References:

Backes M, Pfitzmann B. Symmetric encryption in a simulatable Dolev-Yao style cryptographic library[C]// 2004.

Roberto M. Amadio, Witold Charatonik. On Name Generation and Set-Based Analysis in the Dolev-Yao Model[C]// Proceedings of the 13th International Conference on Concurrency Theory. 2002.

Backes M, Backes M, Duermuth M, et al. A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol[J]. 2004, 3193(2004):89--108.

2, strong security model eCK concept  

   eCK concept of strong security model is more complex, just say here that strong security model name in the opponent's offensive capabilities have capacity. Long-term private key is revealed, forward security, DY model, random numbers leaked secret session key leaks, leaks and other state association

eCK strong security model References:

. Ni Liang, Chen Liang Gong, Li Jianhua security eCK model analysis [J] Shandong University (Natural Science) (7): 49-53 + 70.

. Zhaojian Jie, Dawu Valley under eCK model provably secure both the authentication key agreement protocol [J] Journal of Computers (1): 49-56.

   

Guess you like

Origin www.cnblogs.com/xinxianquan/p/11893117.html