【24h】

Deriving, Attacking and Defending the GDOI Protocol

机译:派生,攻击和捍卫GDOI协议

获取原文
获取原文并翻译 | 示例

摘要

As a part of a continued effort towards a logical framework for incrementai reasoning about security, we attempted a derivational reconstruction of GDOI, the protocol proposed in IETF RFC 3547 for authenticated key agreement in group communication over IPsec. The difficulties encountered in deriving one of its authentication properties led us to derive an attack that had not surfaced in the previous extensive analyses of this protocol. The derivational techniques turned out to be helpful not only for constructing, analyzing and modifying protocols, but also attacks on them. We believe that the presented results demonstrate the point the derivational approach, which tracks and formalizes the way protocols are designed informally: by refining and composing basic protocol components. After a brief overview of the simple authentication logic, we outline a derivation of GDOI, which displays its valid security properties, and the derivations of two attacks on it, which display its undesired properties. We also discuss some modifications that eliminate these vulnerabilities. Their derivations suggest proofs of the desired authentication. At the time of writing, we are working together with the Msec Working Group to develop a solution to this problem.
机译:作为对用于安全性增量推理的逻辑框架的持续努力的一部分,我们尝试了GDOI的派生重建,GDOI是IETF RFC 3547中提出的协议,用于IPsec组通信中的认证密钥协议。导出其身份验证属性之一时遇到的困难使我们产生了一种在以前对该协议进行的广泛分析中尚未发现的攻击。事实证明,派生技术不仅对构造,分析和修改协议有帮助,而且对协议也有帮助。我们认为,提出的结果证明了派生方法的意义,该方法跟踪和形式化了非正式设计协议的方式:通过完善和组成基本协议组件。在简单认证逻辑的简要概述之后,我们概述了显示GDOI的派生,GDOI显示了其有效的安全属性,以及对它的两次攻击的派生,显示了其不良的属性。我们还将讨论一些消除这些漏洞的修改。他们的推导表明了所需认证的证据。在撰写本文时,我们正在与Msec工作组合作以开发针对此问题的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号