Model Logic Approach for Analyzing the Flaws of Security Protocol Cryptosystem-related Flaws

MAO Chen-xiao,LUO Wen-jian,WANG Xu-fa
DOI: https://doi.org/10.3969/j.issn.1000-1220.2006.07.016
2006-01-01
Abstract:A security protocol implemented with an improper cryptosystem may have cryptosystem-related flaws.It is difficult to analyze this kind of flaws because the perfect encryption hypothesis cannot be used.CKT5 logic is extended.Focused on the symmetric key cryptography,the properties of the stream cipher and the block cipher are introduced into the logical framework of CKT5 in the form of logical inference rules,which make the extended logic to be capable to analyze the cryptosystem-related flaws.An example is given to illustrate how to use the extended logic to analyze the cryptosystem-related flaws.
What problem does this paper attempt to address?