By Topic

Strand Space Model of Amended NS Protocol and Its Analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shimin Wei ; Coll. of Comput. Sci. & Tech., Huaibei Coal Normal Univ., Huaibei, China ; Yuyan Guo

A strand is a sequence of events; it represents either an execution by a legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a collection of strands, equipped with a graph structure generated by causal interaction. In this framework, protocol correctness claims may be expressed in terms of the connections between strands of different kinds.It is the first time to prove the Miao-Hepsilas modified version of Needham-Schroeder protocol with the theory of strand space which is a rising formal analysis tool. Firstly, its authentication is analysed, the analysis contains responserpsilas authentication and sponsorpsilas authentication. Then its confidentiality is analysed, and two concepts honest and ideal are used to simplify the process of verification. It indicates that K, Nb, and Nb 0 are secret. At last, the result shows that the amended N-S protocol can reach the goal, and it is consistent with the result of Miao-Hepsilas analysis.

Published in:

Computer Science and Information Engineering, 2009 WRI World Congress on  (Volume:1 )

Date of Conference:

March 31 2009-April 2 2009