Method of designing security protocol for remote attestation
|更新时间:2024-10-14
|
Method of designing security protocol for remote attestation
Issue 10, Pages: 19-24(2008)
作者机构:
1. 武汉大学计算机学院
2. 武汉大学空天信息安全与可信计算教育部重点实验室
作者简介:
基金信息:
DOI:
CLC:TP393.08
Published:2008
稿件说明:
移动端阅览
YU Rong-wei1, WANG Li-na1, KUANG Bo1. Method of designing security protocol for remote attestation[J]. 2008, (10): 19-24.
DOI:
YU Rong-wei1, WANG Li-na1, KUANG Bo1. Method of designing security protocol for remote attestation[J]. 2008, (10): 19-24.DOI:
Method of designing security protocol for remote attestation
摘要
通过引入优胜劣汰的自然规律
提出了改进的基于演化计算的密码协议自动化设计方法。该方法采用模态逻辑作为描述协议的基本工具
重点改进了衡量安全协议个体性能的评估函数
以求获得全局最优解。实验结果显示
该方法能保证所设计协议的正确性和安全性
具有较强的可行性和适用性。
Abstract
By the introduction of the natural law of survival of the fittest
an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them
construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore