Then , it introduce several cryptographic protocol based on elliptical curve , including diffie - hellman key switching , elgamal encryption and decryption , elgamal digital signature , ecdsa , etc . based on these , the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives 然后介绍了基于椭圆曲线的几种密码协议,包括diffie ? hellman密钥交换, elgamal加解密, elgamal数字签名, ecdsa等协议。在此基础之上,分析了3g系统面临的各种安全威胁并对系统的安全原则和安全目标进行了讨论。
In this dissertation we present a general , extensible methodology that examines cryptographic protocols . our approach is specify a protocol in cpal ( cryptographic protocol analysis language ) , apply hoare and dijkstra ? theory of formal semantics to it , analysis it ? forma ] semantics , define weakest precondition of each kind of language statement 我们的方法就是用cpal ( cryptographicprotocolanalysislanguage )语言来表示协议,将hoare和dijkstra在形式语义方面的理论应用到该语言,分析该语言的形式语义,定义每种语句的最弱前置条件。
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.