Study on strand space model theory

  • Authors:
  • Qing Guang Ji;Si Han Qing;Yong Bin Zhou;Deng Guo Feng

  • Affiliations:
  • State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences and Engineering Research Center for Information Security Technology, Institute of Software, TCA ...;State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China;State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China;State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China

  • Venue:
  • Journal of Computer Science and Technology
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The growing interest in the application of formal methods of cryptographic protocol analysis has led to the development of a number of different ways for analyzing protocol. In this paper, it is strictly proved that if for any strand, there exists at least one bundle containing it, then an entity authentication protocol is secure in strand space model (SSM) with some small extensions. Unfortunately, the results of attack scenario demonstrate that this protocol and the Yahalom protocol and its modification are de facto insecure. By analyzing the reasons of failure of formal inference in strand space model, some deficiencies in original SSM are pointed out. In order to break through these limitations of analytic capability of SSM, the generalized strand space model (GSSM) induced by some protocol is proposed. In this model, some new classes of strands, oracle strands, high order oracle strands etc., are developed, and some notions are formalized strictly in GSSM, such as protocol attacks, valid protocol run and successful protocol run. GSSM can then be used to further analyze the entity authentication protocol. This analysis sheds light on why this protocol would be vulnerable while it illustrates that GSSM not only can prove security protocol correct, but also can be efficiently used to construct protocol attacks. It is also pointed out that using other protocol to attack some given protocol is essentially the same as the case of using the most of protocol itself.