Cryptographic Protocols Based on Nielsen Transformations
نویسندگان
چکیده
منابع مشابه
Transformations between Cryptographic Protocols
A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformations are useful for modeling protocol design, protocol composition, and the services that protocols provide. A protocol transformation determines a map from partial behaviors A1 of Π1—which we call “skeletons”—to skeletons F (A1) ...
متن کاملCryptographic protocols based on inner product spaces and group theory with a special focus on the use of Nielsen transformations
The topic of this thesis is established in the area of mathematical cryptology, more preciselyin group based cryptology. We give extensions of cryptographic protocols, develop new crypto-graphic protocols concerning the mathematical background and give modifications of them. Inaddition cryptographic analysis as well as examples are given. The focus lays on the developmentof new ...
متن کاملSome attacks on quantum-based cryptographic protocols
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...
متن کاملMethodical Use of Cryptographic Transformations in Authentication Protocols
Design of cryptographic protocols for authentication and key management is well known to be a diicult problem. While much research has been devoted to analysis techniques, basic design principles remain lacking. In this paper a common method of protocol design is identiied which contributes to protocol problems in a number of ways. This is the practice of encrypting all relevant elds using a re...
متن کاملSuperposition Attacks on Cryptographic Protocols
Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. Even if the protocol is quantum, the queries are typically classical. In this paper, we introduce a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and Communications
سال: 2016
ISSN: 2327-5219,2327-5227
DOI: 10.4236/jcc.2016.412004