A survey of algebraic properties used in cryptographic protocols
نویسندگان
چکیده
منابع مشابه
A survey of algebraic properties used in cryptographic protocols
Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties...
متن کاملProcess Algebraic Analysis of Cryptographic Protocols
Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the eld of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus { most notably Abadi and Gordon's spi-calculus { as protocol description languages. W...
متن کاملa model for specification of cryptographic protocols and its operational interpretation with algebraic methods
logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...
متن کاملFormal Verification of Cryptographic Protocols: A Survey
In this paper we give a survey of the state of the art in the application of formal methods to the analysis of cryptographic protocols. We attempt to outline some of the major threads of research in this area, and also to document some emerging trends. : : :
متن کاملPairing-Based Cryptographic Protocols : A Survey
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves have recently been found applications in design of cryptographic protocols. In this survey, we have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Security
سال: 2006
ISSN: 1875-8924,0926-227X
DOI: 10.3233/jcs-2006-14101