An Attack on Digital Signature Protocol Based on Intruder's Role Impersonate
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Security protocols play more and more important role with the bursting development of Internet. Formal authentication is an effective way to detect flaws in those protocols. There are many automatic checkers for verifying protocols, but few can deal with digital signature protocols. This paper proposes a new tool for formal automatic verifying. It can have an effective check for digital signature protocols. It is based on intruder's role impersonate and backward deduction. It was implemented by using JAVA.

    Reference
    Related
    Cited by
Get Citation

王新兵,马征,黄连生,周宏斌.基于角色冒充对数字签名协议的攻击.软件学报,2001,12(12):1769-1774

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:February 09,2001
  • Revised:May 25,2001
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063