Abstract
In recent years, research based on strand space theories is a hotspot in the field of formal analysis method of security protocols. However, some extended theories based on strand space still has defects, and the analysis of security protocols is not accurate enough. And the model based on improved strand space theories is complex and not easy to develop automated verification tool. Based on this, the same execution bundle, matching strand, private item, etc. are proposed in this paper. In strand space, the matching strand of a given regular strand can be determined by the private item and the security key of the message item to prove the consistency of the security protocols. This paper proves the validity and accuracy of the extended strand space theories by analyzing Woo-Lam and Kerberos protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand space: Why is a security protocol correct. In: The 18th IEEE Symposium 1998, Oakland, USA, pp. 160–171. IEEE, Oakland (1998)
Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand space: proving security protocols correct. J. Comput. Secur. 7(2,3), 191–230 (1999)
Guttman, J.D., Thayer, F.J.: Authentication tests and the structure of bundles. Theoret. Comput. Sci. 283(2), 333–380 (2002)
Li, L., Wang, L., Chen, J., Wang, R., Zhang, Z.: Fairness analysis for multiparty nonrepudiation protocols based on improved strand space. Discrete Dyn. Nat. Soc. 2014(1), 1–7 (2014)
Chang, Y., Zhang, Z., Wang, J.: A security protocol for trusted access to cloud environment. Recent Adv. Electr. Electron. Eng. 8(2), 135–144 (2015)
Lei, Y.U., Wei, S., Zhuo, Z.: Research on consistence of strand parameters for protocol principals in authentication test theory. Comput. Eng. Appl. 51(13), 86–90 (2015)
Fan, Y., Escobar, S., Meadows, C., Meseguer, J., Santiago, S.: Strand spaces with choice via a process algebra semantics. In: International Symposium on Principles & Practice of Declarative Programming (2016)
Dong, X., Yang, C., Sheng, L., Wang, C., Ma, J.: A new method to deduce counterexamples in secure routing protocols based on strand space model. Secur. Commun. Netw. 9(18), 5834–5848 (2017)
Xiong, L., Peng, D.Y.: An improved authentication test for security protocol analysis. Commun. Technol. 47(08), 951–954 (2014)
Sureshkumar, V., Anitha, R.: Analysis of electronic voting protocol using strand space model. In: MartÃnez Pérez, G., Thampi, Sabu M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 416–427. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54525-2_37
Song, W.T., Bin, H.U.: One strong authentication test suitable for analysis of nested encryption protocols. Comput. Sci. 42(1), 149–169 (2015)
Wei, F., Feng, D.G.: Analyzing trusted computing protocol based on the strand spaces model. Chin. J. Comput. 38(4), 701–716 (2015)
Song, W.T., Hu, B.: Approach to detecting type-flaw attacks based on extended strand spaces. Comput. J. 58(4), 572–587 (2018)
Yao, M.M., Zhu, Z.C., Liu, M.D.: An improved formal analysis method based on authentication tests. Netinfo Secur. 19(1), 27–33 (2019)
Doghmi, S.F., Guttman, J.D., Thayer, F.J.: Searching for shapes in cryptographic protocols// Proceedings of the 13th TACAS. LNCS4424. Berlin: Springer. 523–537(2007)
Guttman, J.D.: State and progress in strand spaces: Proving fair exchange. J. Autom. Reason. 48(2), 159–195 (2012)
Ramsdell, J.D., Guttman, J.D.: CPSA Primer. The MITER Corporation, Bedford (2012)
Ramsedll, J.D.: Proving Security Goals with Shape Analysis Sentences. The MITER Corporation, Bedford (2013)
Ramsdell, J.D., Dougerty, D.J., et al.: A Hybrid Analysis for Security Protocols with State. The MITER Corporation, Bedford (2014)
Liu, J.: Automatic verification of security protocols with strand space theory. J. Comput. Appl. 35(7), 1870–1876 (2015)
Yu, L., Wei, S.M., Jiang, M.M.: Formal analysis method of security protocol based on correlation degree of principals. Netinfo Secur. (2018)
Yuan, B.A., Liu, J., Zhou, H.G.: Study and development on cryptographic protocol. J. Mil. Commun. Technol. 38(1), 90–94 (2018)
Wei, H., Xie, Z.L., Yi, G.Z.: Analysis of kerberos protocol based on strand spacd theory. Comput. Technol. Dev. 2013(12), 109–112 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yao, Mm., Zhang, J., Weng, X. (2019). Research of Formal Analysis Based on Extended Strand Space Theories. In: Huang, DS., Jo, KH., Huang, ZK. (eds) Intelligent Computing Theories and Application. ICIC 2019. Lecture Notes in Computer Science(), vol 11644. Springer, Cham. https://doi.org/10.1007/978-3-030-26969-2_61
Download citation
DOI: https://doi.org/10.1007/978-3-030-26969-2_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26968-5
Online ISBN: 978-3-030-26969-2
eBook Packages: Computer ScienceComputer Science (R0)