J4

• Original Articles • Previous Articles     Next Articles

Research on computational soundness of formal attacker ability description

TIAN Hai-bo(1);DING Yong(2);WANG Yu-min(1)   

  1. (1) State Key Lab. of Integrated Service Networks, Xidian Univ., Xi′an 710071, China
    (2) Dept. of Computation Science and Mathematics, Guilin Inst. of Electronic Technology., Guilin 541004, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-10-20 Published:2006-10-30

Abstract: This paper researches the computational soundness of the ability description about a formal attacker in a formal analytical system when security protocols use only data integrity algorithms. Firstly, the authors assume that a computational attacker is more powerful than a formal attacker. Secondly, an attack experiment is constructed. And thirdly, a contradiction is proved about the output of the computational attack of the attack experiment against the security definitions of signature algorithms and keyed hash functions. So the conclusion is obtained that all the messages created by a computational attacker belong to the message closure which can be created by a formal attacker. Based on the conclusion, one can construct or improve a formal analytical system to make sound computations.

Key words: security protocols, formal attacker, computational attacker

CLC Number: 

  • TP393