發表於2024-12-27
基本信息
書名:密碼協議:基於可信任新鮮性的安全性分析(英文版)
定價:48.00元
作者:董玲,陳剋非
齣版社:高等教育齣版社
齣版日期:2011-10-01
ISBN:9787040313314
字數:
頁碼:373
版次:1
裝幀:精裝
開本:16開
商品重量:0.763kg
編輯推薦
內容提要
《密碼協議:基於可信任新鮮性的安全性分析(英文版)》主要介紹如何利用係統工程思想和可信任新鮮性的方法,分析和設計密碼通信協議。作者基於可信任的新鮮性標識符概念,提齣瞭一個新穎的新鮮性原則。該原則指齣瞭一種有效的、易用的密碼協議安全性分析方法。使用這種分析方法,可以有效檢驗協議在實際應用中能否滿足安全需要。此外,書中給齣大量的分析實0例,詳細說明如何基於概率定義安全性,如何將安全指標定量化,如何針對具體的協議尋找漏洞,如何自動實現協議漏洞的查找,等等。
《密碼協議:基於可信任新鮮性的安全性分析(英文版)》總結瞭作者近年來的研究成果,這些成果的有效性和易用性對從事通信協議安全性研究的人員,特彆是工程技術人員,具有很好的參考和實用價值。董玲網絡係統建設和信息安全領域高級工程師,上海交通大學密碼與信息安全實驗室教授、研究興趣是信息安全和應用密碼學,特彆是實際應用的密碼通信協議和密碼係統的安全性分析。陳剋非上海交通大學計算機科學與工程係教授,長期從事密碼與信息安全理論研究。主要研究興趣是序列密碼、可證明安全、密碼協議分析、數據安全。近年來承擔多項國傢自然科學基金、國傢高技術研究發展計劃(863計劃),發錶學術論文150多篇,編輯齣版學術著作7部。
目錄
l Introductioof Cryptographic Protocols
1.1 Informatiosecurity and cryptography
1.2 Classes of cryptographic protocols
1.2.1 Authenticatioprotocol
1.2.2 Kev establishment protocol
1.2.3 Electronic merce protocol
1.2.4 Secure multi-party protocol
1.3 Security of cryptographic protocols
1.4 Motivations of this book
References
2 Background of Cryptographic Protocols
2.1 Preliminaries
2.1.1 Functions
2.1.2 Terminology
2.2 Cryptographic primitives
2.2.1 Cryptology
2.2.2 Symmetric-key encryption
2.2.3 Public-key encryption
2.2.4 Digital signatures
2.2.5 Hash Functions
2.2.6 Message authentication
2.3 Cryptographic protocols
2.3.1 Secure channel
2.3.2 Principals
2.3.3 Time-variant parameters
2.3.4 Challenge and response
2.3.5 Other classes of cryptographic protocols
2.4 Security of cryptographic protoco
2.4.1 Attacks oprimitives
2.4.2 Attacks oprotocols
2.4.3 Security of protocols
2.4.4 Analysis methods for protocol security
2.5 Communicatiothreat model
2.5.1 Dolev-Yao threat model
2.5.2 Assumptions ofprotoc01 environment
2.5.3 Expressions of cryptographic protocols
References
3 Engineering Principles for Security Desigof Protocols
3.1 Introductioof engineering principles
3.1.1 Prudent engineering principles
3.1.2 Cryptographic protocol engineering principles
3.2 Protocol engineering requirement analysis
3.2.1 Security requirement analysis
3.2.2 Plailltext analysis
3.2.3 Applicatioenvironment analysis
3.2.4 Attack model and adversary abilities analysis
3.2.5 Cryptographic service requirement analysis
3.3 Detailed protocol design
3.3.1 Liveness of the principal’S identity
3.3.2 neshness and associatioof time-variant parameter
3.3.3 Data integrity protectioof message
3.3.4 Stepwise refinement
3.4 Provable security References.
4 Informal Analysis Schemes of Cryptographic Protocols
4.1 The security of cryptographic protocols
4.1.1 Authenticity and confidentiality under putational model
4.1.2 Security definitions
4.2 Security mechanism based otrusted freshenss
4.2.1 Notions
4.2.2 Freshness principle
4.2.3 Security of authenticatioprotoc01
4.2.4 Manual analysis based otrusted freshness
4.2.5 Applicatioof security analysis based otrusted freshness
4.3 Analysis of classic attacks
4.3.1 Maithe middle attack
4.3.2 Source-substitutioattack
……
5 Security Analysis of Real World Protocols
6 Guarantee of Cryptographic Protocol Security
7 Formalism of Protocol Security Analysis
8 Desigof Cryptographic Protocols Based oTrusted
9 Automated Analysis of Cryptographic Protocols
Index
作者介紹
文摘
Over the ages,informatiowas typically stored and transmitted opaper,whereas much of it now resides omagic media and iS transmitted via puter works.As we all know.it iS much easier to copy and alterinformatiostored and transmitted electronically thathat opaper.Infor-matiosecurity intends to provide security services for informatioidigitalform·Informatiosecurity objectives include confidentiality,data integrity,authentication,non-repudiation,access control,availability,fairness and SO on·Computer and work security research and development foCUS othefirst four general security services,from which other security services,such as access control,and fairness cabe derivedwhich is well addressed.For strict 0r inquisitive readers,please refer to book 11 for detailed information.一Confidentiality is a service used to keep the content of informatiofrom aU but those authorized to have it.That is,the informatioia puter systeror transmitted informatiocannot be prehended by unau- thorized parties·Secrecy IS a term synonymous with confidentiality and privacy.
……
序言
密碼協議:基於可信任新鮮性的安全性分析(英文版) 9787040313314 高等教育齣 下載 mobi pdf epub txt 電子書 格式 2024
密碼協議:基於可信任新鮮性的安全性分析(英文版) 9787040313314 高等教育齣 下載 mobi epub pdf 電子書密碼協議:基於可信任新鮮性的安全性分析(英文版) 9787040313314 高等教育齣 mobi epub pdf txt 電子書 格式下載 2024