The NRL protocol analyzer: An overview

被引:202
作者
Meadows, C
机构
来源
JOURNAL OF LOGIC PROGRAMMING | 1996年 / 26卷 / 02期
关键词
D O I
10.1016/0743-1066(95)00095-X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The NRL Protocol Analyzer is a prototype special-purpose verification tool, written in Prolog, that has been developed for the analysis of cryptographic protocols that are used to authenticate principals and services and distribute keys in a network. In this paper we give an overview of how the Analyzer works and describe its achievements so far. We also show how our use of the Prolog language benefited us in the design and implementation of the Analyzer.
引用
收藏
页码:113 / 131
页数:19
相关论文
共 17 条
[1]  
[Anonymous], 1992, J COMPUT SECUR
[2]  
Aziz A., 1994, IEEE Personal Communications, V1, P25, DOI 10.1109/98.295357
[3]  
Burns J., 1990, Computers & Security, V9, P67, DOI 10.1016/0167-4048(90)90159-Q
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[6]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]   ON THE SECURITY OF PING-PONG PROTOCOLS [J].
DOLEV, D ;
EVEN, S ;
KARP, RM .
INFORMATION AND CONTROL, 1982, 55 (1-3) :57-68
[9]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[10]  
KEMMERER R, 1994, J CRYPTOL, V7, P79, DOI 10.1007/BF00197942