Analysis of Security Protocols Based on Authentication Test

Σχετικά έγγραφα
A Formal Method for Analyzing Electronic Commerce Protocols

High order interpolation function for surface contact problem

2 ~ 8 Hz Hz. Blondet 1 Trombetti 2-4 Symans 5. = - M p. M p. s 2 x p. s 2 x t x t. + C p. sx p. + K p. x p. C p. s 2. x tp x t.

ER-Tree (Extended R*-Tree)

A Fault Identification Algorithm for Satellite Networks Based on System Level Diagnosis

2002 Journal of Software., Timed Computation Tree Logic,Metric Interval Temporal Logic Real-Time Temporal Logic

Quick algorithm f or computing core attribute

Correction of chromatic aberration for human eyes with diffractive-refractive hybrid elements

1 (forward modeling) 2 (data-driven modeling) e- Quest EnergyPlus DeST 1.1. {X t } ARMA. S.Sp. Pappas [4]


Study of In-vehicle Sound Field Creation by Simultaneous Equation Method

Congruence Classes of Invertible Matrices of Order 3 over F 2

Nov Journal of Zhengzhou University Engineering Science Vol. 36 No FCM. A doi /j. issn

n 1 n 3 choice node (shelf) choice node (rough group) choice node (representative candidate)

An Automatic Modulation Classifier using a Frequency Discriminator for Intelligent Software Defined Radio

ΑΓΓΕΛΗΣ ΧΡΗΣΤΟΣ ΠΑΝΑΓΙΩΤΗΣ 6 OO ΑΓΓΕΛΙΔΗΣ ΧΑΡΙΛΑΟΣ ΧΡΗΣΤΟΣ 4 OO ΑΓΓΟΥ ΑΝΑΣΤΑΣΙΑ ΔΗΜΗΤΡΙΟΣ 6 OO ΑΔΑΜΙΔΟΥ ΕΥΑΓΓΕΛΙΑ ΑΒΡΑΑΜ 3 OO ΑΛΕΒΙΖΟΥ ΠΑΝΑΓΙΩΤΑ

CorV CVAC. CorV TU317. 1

Bundle Adjustment for 3-D Reconstruction: Implementation and Evaluation

, Litrrow. Maxwell. Helmholtz Fredholm, . 40 Maystre [4 ], Goray [5 ], Kleemann [6 ] PACC: 4210, 4110H

Optimization, PSO) DE [1, 2, 3, 4] PSO [5, 6, 7, 8, 9, 10, 11] (P)

Buried Markov Model Pairwise

A research on the influence of dummy activity on float in an AOA network and its amendments

ITU-R BT ITU-R BT ( ) ITU-T J.61 (

Study on the Strengthen Method of Masonry Structure by Steel Truss for Collapse Prevention

Schedulability Analysis Algorithm for Timing Constraint Workflow Models

Motion analysis and simulation of a stratospheric airship

LUO, Hong2Qun LIU, Shao2Pu Ξ LI, Nian2Bing

ΔΙΕΡΕΥΝΗΣΗ ΤΗΣ ΣΕΞΟΥΑΛΙΚΗΣ ΔΡΑΣΤΗΡΙΟΤΗΤΑΣ ΤΩΝ ΓΥΝΑΙΚΩΝ ΚΑΤΑ ΤΗ ΔΙΑΡΚΕΙΑ ΤΗΣ ΕΓΚΥΜΟΣΥΝΗΣ ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΣΧΟΛΗ ΕΠΙΣΤΗΜΩΝ ΥΓΕΙΑΣ

: Monte Carlo EM 313, Louis (1982) EM, EM Newton-Raphson, /. EM, 2 Monte Carlo EM Newton-Raphson, Monte Carlo EM, Monte Carlo EM, /. 3, Monte Carlo EM

Feasible Regions Defined by Stability Constraints Based on the Argument Principle

Math 6 SL Probability Distributions Practice Test Mark Scheme

ΓΕΩΠΟΝΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΘΗΝΩΝ ΤΜΗΜΑ ΕΠΙΣΤΗΜΗΣ ΤΡΟΦΙΜΩΝ ΚΑΙ ΔΙΑΤΡΟΦΗΣ ΤΟΥ ΑΝΘΡΩΠΟΥ ΤΜΗΜΑ ΦΥΤΙΚΗΣ ΠΑΡΑΓΩΓΗΣ ΔΠΜΣ ΑΜΠΕΛΟΥΡΓΙΑ- ΟΙΝΟΛΟΓΙΑ

No. 7 Modular Machine Tool & Automatic Manufacturing Technique. Jul TH166 TG659 A

A Lambda Model Characterizing Computational Behaviours of Terms

Fractional Colorings and Zykov Products of graphs

ΕΛΕΓΧΟΣ ΤΩΝ ΠΑΡΑΜΟΡΦΩΣΕΩΝ ΧΑΛΥΒ ΙΝΩΝ ΦΟΡΕΩΝ ΜΕΓΑΛΟΥ ΑΝΟΙΓΜΑΤΟΣ ΤΥΠΟΥ MBSN ΜΕ ΤΗ ΧΡΗΣΗ ΚΑΛΩ ΙΩΝ: ΠΡΟΤΑΣΗ ΕΦΑΡΜΟΓΗΣ ΣΕ ΑΝΟΙΚΤΟ ΣΤΕΓΑΣΤΡΟ

Solutions 3. February 2, Apply composite Simpson s rule with m = 1, 2, 4 panels to approximate the integrals:

Homomorphism in Intuitionistic Fuzzy Automata

Optimizing Microwave-assisted Extraction Process for Paprika Red Pigments Using Response Surface Methodology

IPSJ SIG Technical Report Vol.2014-CE-127 No /12/6 CS Activity 1,a) CS Computer Science Activity Activity Actvity Activity Dining Eight-He

( ) , ) , ; kg 1) 80 % kg. Vol. 28,No. 1 Jan.,2006 RESOURCES SCIENCE : (2006) ,2 ,,,, ; ;

Ο νοσηλευτικός ρόλος στην πρόληψη του μελανώματος

Resurvey of Possible Seismic Fissures in the Old-Edo River in Tokyo

Oscillatory integrals

Vol. 31,No JOURNAL OF CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY Feb

Estimation of stability region for a class of switched linear systems with multiple equilibrium points

«Βιοδοκιμές αποτελεσματικότητας ουσιών φυτικής προέλευσης επί του δορυφόρου της πατάτας Leptinotarsa decemlineata (Say) (Coleoptera: Chrysomelidae)»

Σχολή Εφαρμοσμένων Μαθηματικών και Φυσικών Επιστημών. Εθνικό Μετσόβιο Πολυτεχνείο. Thales Workshop, 1-3 July 2015.

A Method for Creating Shortcut Links by Considering Popularity of Contents in Structured P2P Networks

A Method of Trajectory Tracking Control for Nonminimum Phase Continuous Time Systems

( )( ) La Salle College Form Six Mock Examination 2013 Mathematics Compulsory Part Paper 2 Solution

Math221: HW# 1 solutions

90 [, ] p Panel nested error structure) : Lagrange-multiple LM) Honda [3] LM ; King Wu, Baltagi, Chang Li [4] Moulton Randolph ANOVA) F p Panel,, p Z

Quantum dot sensitized solar cells with efficiency over 12% based on tetraethyl orthosilicate additive in polysulfide electrolyte

Πτυχιακή Εργασία Η ΠΟΙΟΤΗΤΑ ΖΩΗΣ ΤΩΝ ΑΣΘΕΝΩΝ ΜΕ ΣΤΗΘΑΓΧΗ

ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΤΜΗΜΑ ΝΟΣΗΛΕΥΤΙΚΗΣ

Q L -BFGS. Method of Q through full waveform inversion based on L -BFGS algorithm. SUN Hui-qiu HAN Li-guo XU Yang-yang GAO Han ZHOU Yan ZHANG Pan

ΣΤΗ ΣΧΕ ΙΑΣΗ ΕΚΠΑΙ ΕΥΤΙΚΟΥ ΛΟΓΙΣΜΙΚΟΥ 1

INTEGRAL INEQUALITY REGARDING r-convex AND

Enzymatic Synthesis of Dithiolopyrrolone Antibiotics Using Cell-Free Extract of Saccharothrix

Application of Genetic Algorithm in Architectural Conceptual Design

ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΣΧΟΛΗ ΕΠΙΣΤΗΜΩΝ ΥΓΕΙΑΣ ΤΜΗΜΑ ΝΟΣΗΛΕΥΤΙΚΗΣ. Πτυχιακή Εργασία

On the Galois Group of Linear Difference-Differential Equations

Development of the Nursing Program for Rehabilitation of Woman Diagnosed with Breast Cancer

SCITECH Volume 13, Issue 2 RESEARCH ORGANISATION Published online: March 29, 2018

Stabilization of stock price prediction by cross entropy optimization

HIV HIV HIV HIV AIDS 3 :.1 /-,**1 +332

Η παραγωγή αναφορικών προτάσεων από κυπριόπουλα παιδιά με Γλωσσική Διαταραχή

ΓΗΠΛΧΜΑΣΗΚΖ ΔΡΓΑΗΑ ΑΡΥΗΣΔΚΣΟΝΗΚΖ ΣΧΝ ΓΔΦΤΡΧΝ ΑΠΟ ΑΠΟΦΖ ΜΟΡΦΟΛΟΓΗΑ ΚΑΗ ΑΗΘΖΣΗΚΖ

If ABC is any oblique triangle with sides a, b, and c, the following equations are valid. 2bc. (a) a 2 b 2 c 2 2bc cos A or cos A b2 c 2 a 2.

Example Sheet 3 Solutions

A summation formula ramified with hypergeometric function and involving recurrence relation

ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΤΜΗΜΑ ΝΟΣΗΛΕΥΤΙΚΗΣ

The Research on Sampling Estimation of Seasonal Index Based on Stratified Random Sampling

ΜΕΛΕΤΗ ΤΗΣ ΗΛΕΚΤΡΟΝΙΚΗΣ ΣΥΝΤΑΓΟΓΡΑΦΗΣΗΣ ΚΑΙ Η ΔΙΕΡΕΥΝΗΣΗ ΤΗΣ ΕΦΑΡΜΟΓΗΣ ΤΗΣ ΣΤΗΝ ΕΛΛΑΔΑ: Ο.Α.Ε.Ε. ΠΕΡΙΦΕΡΕΙΑ ΠΕΛΟΠΟΝΝΗΣΟΥ ΚΑΣΚΑΦΕΤΟΥ ΣΩΤΗΡΙΑ

Inverse trigonometric functions & General Solution of Trigonometric Equations

CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ

IL - 13 /IL - 18 ELISA PCR RT - PCR. IL - 13 IL - 18 mrna. 13 IL - 18 mrna IL - 13 /IL Th1 /Th2

Adaptive grouping difference variation wolf pack algorithm

Oscillation of Nonlinear Delay Partial Difference Equations. LIU Guanghui [a],*

To whom correspondence should be addressed: Dr. Beat Schwaller, Unit of Anatomy,

Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1

*,* + -+ on Bedrock Bath. Hideyuki O, Shoichi O, Takao O, Kumiko Y, Yoshinao K and Tsuneaki G

Solutions_3. 1 Exercise Exercise January 26, 2017

Property of Tensor Satisfying Binary Law

X g 1990 g PSRB

Applying Markov Decision Processes to Role-playing Game

ΕΘΝΙΚΗ ΣΧΟΛΗ ΗΜΟΣΙΑΣ ΙΟΙΚΗΣΗΣ

Other Test Constructions: Likelihood Ratio & Bayes Tests

Reaction of a Platinum Electrode for the Measurement of Redox Potential of Paddy Soil

An Advanced Manipulation for Space Redundant Macro-Micro Manipulator System

ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ

Secure Cyberspace: New Defense Capabilities

ΠΟΛΥΤΕΧΝΕΙΟ ΚΡΗΤΗΣ ΣΧΟΛΗ ΜΗΧΑΝΙΚΩΝ ΠΕΡΙΒΑΛΛΟΝΤΟΣ

ΤΕΧΝΟΛΟΓΙΚΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΣΧΟΛΗ ΕΠΙΣΤΗΜΩΝ ΥΓΕΙΑΣ

Formal Semantics. 1 Type Logic

ΜΕΛΕΤΗ ΑΠΟΤΙΜΗΣΗΣ ΠΑΡΑΓΟΜΕΝΗΣ ΕΝΕΡΓΕΙΑΣ Φ/Β ΣΥΣΤΗΜΑΤΩΝ ΕΓΚΑΤΕΣΤΗΜΕΝΩΝ ΣΕ ΕΛΛΑ Α ΚΑΙ ΤΣΕΧΙΑ

Design and Fabrication of Water Heater with Electromagnetic Induction Heating

Re-Pair n. Re-Pair. Re-Pair. Re-Pair. Re-Pair. (Re-Merge) Re-Merge. Sekine [4, 5, 8] (highly repetitive text) [2] Re-Pair. Blocked-Repair-VF [7]

Transcript:

ISSN 1-9825 CODEN RUXUEW E-mil jos@iscsccn Journl of Softwre Vol17 No1 Jnury 26 pp148 156 http//wwwjosorgcn DOI 1136/jos17148 Tel/Fx 86-1-62562563 26 by Journl of Softwre ll rights reserved ( 2196) nlysis of Security Protocols sed on uthentiction Test YNG Ming LUO Jun-Zhou (Networ Lbortory Deprtment of Computer Science nd Engineering Southest University Nnjing 2196 Chin) Corresponding uthor Phn 86-25-837911 Fx 86-25-83794838 E-mil yngming22@seueducn http//wwwseueducn Yng M Luo JZ nlysis of security protocols bsed on uthentiction test Journl of Softwre 2617(1) 148 156 http//wwwjosorgcn/1-9825/17/148htm bstrct uthentiction Test is new type of nlysis nd design method of security protocols bsed on Strnd spce model nd it cn be used for most types of the security protocols However s Strnd spce model it is inclined to be used for the proof of correctness nd is reltively weer for incorrectness nlysis This pper proposes the concepts of Enhnced uthentiction Test (ET) nd the correspondence function tht cn solve the problem Compred with the originl concept the new pproch is more forml nd cn me protocol nlysis esier both by hnd nd utomticlly ey words networ security; protocol nlysis; Strnd spce model; uthentiction test; uthentiction logic Strnd ; Strnd ET(enhnced uthentiction test) Correspondence ; ;Strnd ; ; TP39 (enhnced uthentiction test ET) Correspondence (correspondence ) 1 Supported by the Ntionl Nturl Science Foundtion of Chin under Grnt No941214 ( ); the Jingsu Provincil ey Lbortory of Networ nd Informtion Security under Grnt NoM2321 ( ); the Jingsu Provincil High-Tech Reserch Progrm under Grnt NoG2436 ( ) Received 24-6-3; ccepted 25-7-28

149 2 (uthentiction tests T) 3 ET Correspondence 4 erberos OR erberos OR ET Correspondence 1 11 Strnd [12] (Strnd spce model SSM) Thyer FàbregHerzog Guttmn 1998 Strnd Strnd Strnd ; Strnd (bundle) [3] Strnd [45] Strnd - ( ) ( ) [4] - Guttmn Thyer Fàbreg 3 Incoming Test(IT)Outgoing Test(OT) Unsolicited Test(UT)T [6] ; Strnd Strnd T ET Correspondence Strnd ET Strnd ; ET [7] ( ) 12 Strnd (1) Strnd Songerezin Perrig then [89] Strnd then ;(2) Strnd Pul Syverson [1] Strnd N N ;(3) Strnd CervestoDurginnovich Scedrov [11] (first-order liner logic) Strnd ;(4) Strnd [12] Strnd (GSSM) Orcle Strnds Strnd

15 Journl of Softwre Vol17 No1 Jnury 26 Strnd ET Correspondence ET 3 [13] ( N [14] ) ( [11] ) ( Strnd ) Strnd ET N 2 Strnd [12] [45] 21 1( Component) t t t t t t t t t t 1 t 1 1 t n= si t term(n) n= si (j<i) 2(Trnsformed Edge Trnsforming Edge) si sj Trnsformed Edge si sj ; si sj Trnsforming Edge si sj 3( Test Component Test) t = { h} n t t n ; t Strnd Σ (Strnd N Fresh ) n n n 1 Trnsformed Edge n n1 4(outgoing test OT) 1 n n 1 t = { h} OT (i) n n1 ;(ii) P ;(iii) n t ;(iv) t n 5(incoming test IT) n n 1 t = { h} IT (i) n n1 ;(ii) P ;(iii) t n1 6(unsolicited test UT) ( ) n t = {h} UT (i) t n ;(ii) P 22 3 T1 C Strnd (bundle) n C n n t OT (i) m m C t m m m Trnsforming Edge;(ii) 1 = t m t 1 { h 1 } 1 t ( ) 1 1 1 P

151 T2 C n n n t IT m m C t m m m Trnsforming Edge T3 C n n t = { h} UT ( ) m C t m 3 ET Correspondence 31 Strnd NS NSL ; Init Strnd 2 NSL NS 1 [4] NSL 2 Init Strnd Tble 1 nlysis of NS nd NSL protocol using T 1 T NS NSL Protocol Difference Conclusion with T Extr nlysis results NSL {NNb} Exists corresponding regulr Strnd height=3 Init (NNb) NS {NNb} Exists corresponding regulr Strnd height=3 Init (*NNb) Chllenge-Response T1~T3 N NSL NS believes response recently believes response to recently NS T Strnd Strnd 3 Nonce Nonce Nonce ; nonce ( ) nonce IT OT; 22 UT Nonce T Strnd Nonce t = { h} T T x Strnd x t x = Strnd Strnd T (S ) S S Nonce S ( ) ( ) (nonce) Strnd Nonce

152 Journl of Softwre Vol17 No1 Jnury 26 7( id) Strnd Σ t S t = t = t P t = S t P t S id(s) Strnd Σ t S t= t S id(s) 2 S Strnd X S T X = S X S 2 1 Chllenge ( s ) T S Response S Type Tble 2 Correspondence of Strnd s principl prmeters 2 Strnd 1 2 3 4 5 6 NULL s 1 s 1 s 1 NULL IT/UT O[R] R 2 s OT O[C] O[C/R] O[C/R] O[C/R] 3 1 IT/UT O[C/R] R 4 5 s 1 6 s OT C O[C/R] C C/R C id(xs) ( [2] g} { iff 1 g = = { g} ) Chllenge ;R id(xs) Response ;O X= s 1 id(s); ( X ) ; 1 2 S S s IT UT( ) s S S id(s) S ( S S ) ( Strnd ) Strnd Nonce 3 S (i) Nonce S ;(ii) 2 S ;(iii) Strnd 3 Strnd NS { N } { NNb} { Nb} { N } { NNb} { Nb} ) ( { N N } b { N b} OT 2 (64) C id ( ) { N N } b id ( ) id( ) { N N } b id( ) = N id( ) = N N b id ( ) = N ; N N 1 N b 7 N N { N } N N NS b b

153 32 (ET) Strnd ET ET 1 C Strnd n C n n t OT m m C t m m m Trnsforming Edge; Strnd T n n m m ET 2 C n n n t IT m m C t m m m Trnsforming Edge; Strnd T n n m m ET 3 C n n t = {h} UT ( ) m C t m ; Strnd T n m 33 Correspondence ET Correspondence 8(Correspondence ) Strnd Correspondence Correspondence = ; Correspondence =n> Strnd 1 n ( Correspondence ) Correspondence Strnd (OTIT UT) i j ET n (n=12 3) Correspondence =(j>correspondence )?j Correspondence j>correspondence Correspondence =j Correspondence M 4 M ( ) = Correspondence M ( ) = height( Strnd( )) = 1 Strnd ( 1 ) M1M2 Mn 2 1 Mi i Mi (OT IT) Mi UT Mi Strnd ; ii Mi Strnd Mi Strnd ET 3 2 erberos OR ET Correspondence Strnd

154 Journl of Softwre Vol17 No1 Jnury 26 1 S S1 2 {TsLb{TsLb} bs } s S2 3 {TsLb} bs {T} b 1 4 {T1} b 2 Fig1 Strnd grph of erberos protocol 1 erberos Strnd 41 erberos erberos S sbs S TsT L S S erberos Strnd (i) Nonce TsT;(ii) blbs s;(iii) S S 1 S 2 term( 2 )={TsLb{TsLb} bs } s Ts( ) Strnd term( 2 ) Ts ; s P 2 Ts UT term( 2 ) 2 (12) S ; Lb ET3 S 2 S2 CorrespondenceS=2 3 4 T OT 2 (22) b ET1 3 4 Correspondence =2 1 2 1 {TsLb}bs {T}b Ts Strnd P P 1 Ts T UT S bs b 2 (12) S ; L b ET3 Strnd mimniml S2 Correspondence S =2 S 1 b ET3 1 3 Correspondence =3

155 S S 4 2 2 Correspond ence( erberos S) = 3 2 2 2 Correspondence S =2 Correspondence =2 b S ; 42 OR OR ET Correspon- dence 2 Correspond ence( OR S) = 4 2 2 b S 2 ; b S ; S b b OR 1 M{NM} s 1 2 M{NM} s {NbM} bs S S1 3 M{Nb} s {Nbb} bs S2 2 M{Nb} s Fig2 4 Strnd grph of OR protocol 2 OR Strnd 5 Strnd Strnd T Strnd ET T Strnd Correspondence ; ET

156 Journl of Softwre Vol17 No1 Jnury 26 References [1] Fàbreg FJT Herzog JC Guttmn JD Strnd spces Why is security protocol correct? In Proc of the 1998 IEEE Symp on Security nd Privcy Los lmitos IEEE Computer Society Press 1998 16 171 http//ieeexploreieeeorg/iel4/5528/14832/ 674832pdf?tp=&rnumber=674832&isnumber=14832 [2] Fàbreg FJT Herzog JC Guttmn JD Strnd spces Proving security protocols correct Journl of Computer Security 1999 7(2 3)191 23 [3] Pulson LC The inductive pproch to verifying cryptogrphic protocols Journl of Computer Security 19986(1)85 128 [4] Guttmn JD Fàbreg FJT uthentiction tests In Proc of the 2 IEEE Symp on Security nd Privcy Los lmitos IEEE Computer Society Press 2 96 19 http//ieeexploreieeeorg/iel5/6864/18435/848448pdf?tp=&rnumber=848448& isnumber=18435 [5] Guttmn JD Fàbreg FJT uthentiction tests nd the structure of bundles Theoreticl Computer Science 22283(2)333 38 [6] Guttmn JD Security protocol design vi uthentiction tests In Proc of the 22 IEEE Computer Security Foundtions Worshop Los lmitos IEEE Computer Society Press 22 92 13 http//ieeexploreieeeorg/iel5/7957/21985/12189pdf? tp=&rnumber=12189&isnumber=21985 [7] Woo TYC Lm SS semntic model for uthentiction protocols In Proc of the 1993 IEEE Computer Society Symp on Reserch in Security nd Privcy Los lmitos IEEE Computer Society Press 1993 178 194 http//ieeexploreieeeorg/iel2/ 92/7168/287633pdf?tp=&rnumber=287633&isnumber=7168 [8] Song DXD then new efficient utomtic checer for security protocol nlysis In Proc of the 12th IEEE Computer Security Foundtions Worshop Los lmitos IEEE Computer Society Press 1999 192 22 http//ieeexploreieeeorg/iel5/6332/16921/ 779773pdf?tp=&rnumber=779773&isnumber=16921 [9] Song D erezin S Perrig then novel pproch to efficient utomtic security protocol nlysis Journl of Computer Security 219(1)47 74 [1] Syverson P Towrds strnd semntics for uthentiction logic Electronic Notes in Theoreticl Computer Science 19992 143 157 http//citeseeristpsuedu/syverson99towrdshtml [11] Cervesto I Durgin N novich M Scedrov Interpreting strnds in liner logic In Veith H Heintze N Clr E eds Proc of the 2 Worshop on Forml Methods nd Computer Security Chicgo 2 http//theorystnfordedu/~ilino/ppers/fmcs psgz [12] Ji QG Qing SH Zhou Y Feng DG Study on strnd spce model theory Journl of Computer Science nd Technology 23 18(5)553 57 [13] Fn H Feng DG Security Protocol Theory nd Method eijing Science Press 23 41 42 (in Chinese) [14] urrows M bdi M logic of uthentiction CM Trns on Computer Systems 1998(1)18 36 [13] 2341 42 (1979 ) (196 ) CCF