On the analysis of BAN-logic and some possible attacks, the protocol is secure.
通过BAN逻辑及各种可能的攻击分析,证明协议是安全的。
BAN logic can prove whether a protocol can reach expected target and find some defects in the protocol, which helps the protocol get further improvement.
BAN逻辑可以证明协议是否能够达到预期目标,还能够发现协议中存在的一些缺陷,为进一步改进提供参考。
Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.
并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。
The enhanced Kerberos protocol's validity was finally proved by BAN logic.
最后使用BAN逻辑对该协议的正确性进行了证明。
By BAN logic analysis, the security of this new protocol is proved.
通过BAN逻辑分析,证明了改进协议的安全性。
BAN logic has been by far the most widely used.
BAN逻辑是目前使用最广泛的。
As for the flaws of the SSL handshake protocol part in the SSL based security communication model, the thesis proposes a PMI based solution and analyzes the design by using the BAN logic.
针对基于SSL的安全通信模型中ssl握手协议部分在访问控制方面的缺陷,本文提出了一个基于pmi的全解决方案,并对改进设计进行了分析和BAN逻辑证明。
Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.
采用BAN逻辑对该协议进行形式化分析表明:协议达到了认证和密钥分配的目标,具有较强的安全性。
At last, the author has analysed X. 509 protocol with BAN logic, has found two defects existing in this protocol, and has put forward the suggestion improved.
最后,作者用BAN逻辑分析了X . 509协议,发现了协议中存在的两个缺陷,并提出了改进的建议。
BAN family of logic is used to analyze the security of cryptographic protocols.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
To improve the BAN (Burrows, Abadi & Needham)logic, an analysis and design logic for authentication security was proposed based on the BSW (Buttyan, Staamann & Wilhelm) logic.
针对BAN逻辑的局限性,在BSW逻辑的基础上,提出了一种针对认证安全性的分析与设计逻辑。
After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.
通过建立协议的理想化模型,利用BAN逻辑形式化分析该协议,在理论上证明其安全性。
BAN logic is introduced in this paper, and the flaw in an authentication protocol is found. This implies that it is effective to analysis the authentication protocol using BAN logic.
介绍了BAN逻辑,并用其对一个认证协议进行了分析,找到了该认证协议的一些弱点,说明了用BAN逻辑来对认证协议进行分析是有效的。
There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.
人们提出了多种密码协议的分析方法,BAN类逻辑是其中重要的一种。
This paper designs a kind of mutual authentication scheme, which is based on the improved algorithm of HARN digital signature. Then it is proved by using BAN Logic.
本文设计了一种基于改进的HARN数字签名算法的双向认证方案,并利用BAN逻辑对此方案进行了验证。
However, an improvement proposal called Dual-way Challenge Handshake and Logoff Authentication was proposed, and a formal analysis was done on it with an improved BAN logic.
提出并实现了一种双向挑战握手及下线验证的改进方案,并用一种改进的BAN逻辑对其进行了形式化分析。
However, an improvement proposal called Dual-way Challenge Handshake and Logoff Authentication was proposed, and a formal analysis was done on it with an improved BAN logic.
提出并实现了一种双向挑战握手及下线验证的改进方案,并用一种改进的BAN逻辑对其进行了形式化分析。
应用推荐