Programming Cryptographic Protocols
نویسندگان
چکیده
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principals engaging in it. Moreover, trust management assertions may be attached to protocol actions, constraining the behavior of a principal to be compatible with its own trust policy. We embody these ideas in a cryptographic protocol programming language cppl at the Dolev-Yao level of abstraction. A strand space semantics for cppl shaped our compiler development, and allows a protocol designer to prove that a protocol is sound.
منابع مشابه
A Java Beans Component Architecture for Cryptographic Protocols
Global networking has brought with it both new opportunities and new security threats on a worldwide scale. Since the Internet is inherently insecure, secure cryptographic protocols and a public key infrastructure are needed. In this paper we introduce a protocol component architecture that is well suited for the implementation of telecommunications protocols in general and cryptographic protoc...
متن کاملSecure Implementation of Cryptographic Protocols: A Case Study of Mutual Distrust
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are ba...
متن کاملFormal representation and reasoning approaches in modelling cryptographic protocols
We survey at a very high level some examples of existing work involving the formal verification of the properties of cryptographic protocols. For the purposes of this survey, formal verification includes the use of logics, proof systems, and inductive reasoning. The goal of this survey is twofold. First, it reviews a few existing attempts found in the literature to model cryptographic protocols...
متن کاملcPLC - A Cryptographic Programming Language and Compiler
Cryptographic two-party protocols are used ubiquitously in everyday life. While some of these protocols are easy to understand and implement (e.g., key exchange or transmission of encrypted data), many of them are much more complex (e.g., ebanking and e-voting applications, or anonymous authentication and credential systems). For a software engineer without appropriate cryptographic skills the ...
متن کاملPoster: A Symbolic Logic with Concrete Bounds for Cryptographic Protocols
Large and complex cryptographic protocols form the backbone of internet security today. A lot of attention has focused on developing formal reasoning principles for proving the correctness of cryptographic protocols ([1], [2], [3], [4]). Formal techniques for proving correctness of cryptographic protocols have largely focused on the asymptotic computational model, where security guarantees are ...
متن کاملUsing tccp for the Speci cation of Communication Protocols ∗
The automatic analysis of cryptographic protocols by using formal methods on concurrent languages is a subject widely treated in the literature. From its beginning in the decade of the 70s, the eld has been gaining maturity and consolidation. The Timed Concurrent Constraint Language (tccp in short) is a declarative concurrent programming language which, like other concurrent languages, allows u...
متن کامل