Journal on Communications ›› 2012, Vol. 33 ›› Issue (Z1): 250-254.doi: 10.3969/j.issn.1000-436x.2012.z1.033

• Papers • Previous Articles     Next Articles

Improvement and formal proof on protocol Otway-Rees

Lai-feng LU1,Xin-dong DUAN2,Jian-feng MA3   

  1. 1 College of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710062,China
    2 School of Software Nan Yang Institute of Technology,Nanyang 430074,China
    3 Ministry of Education Key Laboratory of Computer Networks and Information Security,Xidian University,Xi’an 710071,China
  • Online:2012-09-25 Published:2017-08-03
  • Supported by:
    The National Natural Science Foundation of China;The Natural Science Foundation of Shaanxi Province;The Natural Science Foundation of Shaanxi Province;The Fundamental Research Funds for the Central Universities;The Fundamental Research Funds for the Central Universities;The Fundamental Research Funds for the Central Universities

Abstract:

Choosing the authentication key distribution protocol Otway-Rees as the research object,using protocol composition logic (PCL) as proof tool,the security protocol analysis and formal proof was studied.Firstly,this paper gave the forms of security attack,analyzed the Otway-Rees defects and put forward the amended protocol (named as AOR protocol).Then,PCL was extended.And then PCL was used to describe and prove the behavior of each entity and the safety of the protocol attribute formally.Finally,the conclusion was given that the amended AOR protocol has the security attribute of key confidentiality.

Key words: security protocol, formal methods, protocol composition logic, protocol Otway-Rees

No Suggested Reading articles found!