A System for Deriving Vulnerabilities of Security Protocols

碩士 === 國立交通大學 === 資訊科學系所 === 93 === A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights si...

Full description

Bibliographic Details
Main Author: 蔡柏良
Other Authors: 楊武
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/77828963901121099706
id ndltd-TW-093NCTU5394060
record_format oai_dc
spelling ndltd-TW-093NCTU53940602016-06-06T04:10:40Z http://ndltd.ncl.edu.tw/handle/77828963901121099706 A System for Deriving Vulnerabilities of Security Protocols 安全規約分析系統 蔡柏良 碩士 國立交通大學 資訊科學系所 93 A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights since past years. Many logic systems have been proposed in plenty of papers. However, they are either hard to implement or need lots of experience. We propose an efficient system for inspecting the correctness of security protocols and its implementation, which we adopt prolog language as our derivation engine. Then we suggest detection methods to reveal the potential vulnerabilities of a security protocol. We believe that the proposed system will be helpful in testing a security protocol. 楊武 2005 學位論文 ; thesis 55 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊科學系所 === 93 === A security protocol plays an important role in network environment in that under current network environment, no one can make sure whom he is “talking” to is whom he was intending to talk to. The soundness of a security protocol has been drawing many spotlights since past years. Many logic systems have been proposed in plenty of papers. However, they are either hard to implement or need lots of experience. We propose an efficient system for inspecting the correctness of security protocols and its implementation, which we adopt prolog language as our derivation engine. Then we suggest detection methods to reveal the potential vulnerabilities of a security protocol. We believe that the proposed system will be helpful in testing a security protocol.
author2 楊武
author_facet 楊武
蔡柏良
author 蔡柏良
spellingShingle 蔡柏良
A System for Deriving Vulnerabilities of Security Protocols
author_sort 蔡柏良
title A System for Deriving Vulnerabilities of Security Protocols
title_short A System for Deriving Vulnerabilities of Security Protocols
title_full A System for Deriving Vulnerabilities of Security Protocols
title_fullStr A System for Deriving Vulnerabilities of Security Protocols
title_full_unstemmed A System for Deriving Vulnerabilities of Security Protocols
title_sort system for deriving vulnerabilities of security protocols
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/77828963901121099706
work_keys_str_mv AT càibǎiliáng asystemforderivingvulnerabilitiesofsecurityprotocols
AT càibǎiliáng ānquánguīyuēfēnxīxìtǒng
AT càibǎiliáng systemforderivingvulnerabilitiesofsecurityprotocols
_version_ 1718294385008836608