Journal on Communications ›› 2014, Vol. 35 ›› Issue (11): 117-125.doi: 10.11959/j.issn.1000-436x.2014.11.013

• security protocol • Previous Articles     Next Articles

SAT-based lazy formal analysis method for security protocols

Chun-xiang GU1,2,Huan-xiao WANG1,Yong-hui ZHENG1,2,Dan XIN1,Nan LIU1,2   

  1. 1 Institute for Network Security,PLA Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Wuxi 214125,China
  • Online:2014-11-25 Published:2017-06-20
  • Supported by:
    Henan Provincial Science and Technology Innovation Fund for Outstanding Young;Foundation and Research in Cutting-edge Technologies in the Project of Henan Province

Abstract:

A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding support for strong type flaw attack defect,the attack detection becomes more comprehensive.A security protocol analysis tool is implemented based on the method; a type flaw attack is detected for protocol Otway-Rees.For OAuth2.0 protocol,analysis shows that there is a kind of man-in-the-middle attack of the authorization code in some application scenarios.

Key words: security protocols, formalization analysis, Boolean satisfiability problem, lazy analyze, type flaw attack

No Suggested Reading articles found!