Cryptographic Protocols Based on Nielsen Transformations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transformations between Cryptographic Protocols

A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformations are useful for modeling protocol design, protocol composition, and the services that protocols provide. A protocol transformation determines a map from partial behaviors A1 of Π1—which we call “skeletons”—to skeletons F (A1) ...

متن کامل

Cryptographic protocols based on inner product spaces and group theory with a special focus on the use of Nielsen transformations

The topic of this thesis is established in the area of mathematical cryptology, more preciselyin group based cryptology. We give extensions of cryptographic protocols, develop new crypto-graphic protocols concerning the mathematical background and give modifications of them. Inaddition cryptographic analysis as well as examples are given. The focus lays on the developmentof new ...

متن کامل

Some attacks on quantum-based cryptographic protocols

Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...

متن کامل

Methodical Use of Cryptographic Transformations in Authentication Protocols

Design of cryptographic protocols for authentication and key management is well known to be a diicult problem. While much research has been devoted to analysis techniques, basic design principles remain lacking. In this paper a common method of protocol design is identiied which contributes to protocol problems in a number of ways. This is the practice of encrypting all relevant elds using a re...

متن کامل

Superposition Attacks on Cryptographic Protocols

Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. Even if the protocol is quantum, the queries are typically classical. In this paper, we introduce a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer and Communications

سال: 2016

ISSN: 2327-5219,2327-5227

DOI: 10.4236/jcc.2016.412004