The Game of the Name in Cryptographic Tables

نویسندگان

  • Roberto M. Amadio
  • Sanjiva Prasad
چکیده

We present a name-passing calculus that can be regarded as a simpli ed calculus equipped with a cryptographic table. The latter is a data structure representing the relationships among names. We apply the calculus to the modelling and veri cation of secrecy and authenticity properties in cryptographic protocols relying on symmetric shared keys. Following classical approaches [8], we formulate the veri cation task as a reachability problem and prove its decidability assuming nite principals and bounds on the sorts of the messages synthesized by the attacker. Key-words: Cryptographic protocols, -calculus, veri cation The rst author works at Université de Provence, Marseille. and he is an external collaborator of the INRIA-Ecole des Mines Project Meije. He can be contacted at the following address: CMI, 39 rue JoliotCurie, F-13453, Marseille, France. mailto: [email protected]. He work was partly supported by Action Coopérative PRESYSA, IFCPAR 1502-1, LIM (CNRS ES-A6077), and WG Confer. The second author works at the Indian Institute of Technology, Delhi. mailto: [email protected]. He was partly supported by IFCPAR 1502-1 and AICTE 1-52/CD/CA(08)/96-97 and BRICS, Centre of the Danish National Research Foundation. Le jeu du nom dans les tables cryptographiques Résumé : Nous présentons un calcul avec passage de noms qui peut être consideré comme un -calcul simpli é equipé avec une table cryptographique. Il s'agit d'une structure de données qui représente les relations entre les noms. Nous appliquons le calcul à la modelisation et véri cation de proprietés de securité et authenticité dans les protocoles cryptographiques à clef symétrique. Suivant des approches classiques [8], nous formulons le problème de véri cation comme une proprieté d'accessibilité et nous prouvons sa decidabilité en supposant un nombre ni de principaux et une borne sur les sortes des messages synthétisés par l'attaquant. Mots-clés : Protocoles cryptographiques, -calcul, véri cation. The game of the name in cryptographic tables 3

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

حمایت نظام حقوق مالکیت فکری از حقوق بازی‌باز کنشگردر بازی‌های رایانه‌ای

Nowadays video games are fast becoming one of the most popular media of choice. For more than thirty years now video games are amongst us. At the start being a new form of entertainment for the youth only, in no time it has grown into a medium enjoyed and used for various purposes by consumers of all ages. The global market for video games is still expected to grow substantially in the upcoming...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999