The Game of the Name in Cryptographic Tables
نویسندگان
چکیده
We present a name-passing calculus that can be regarded as a simpli ed calculus equipped with a cryptographic table. The latter is a data structure representing the relationships among names. We apply the calculus to the modelling and veri cation of secrecy and authenticity properties in cryptographic protocols relying on symmetric shared keys. Following classical approaches [8], we formulate the veri cation task as a reachability problem and prove its decidability assuming nite principals and bounds on the sorts of the messages synthesized by the attacker. Key-words: Cryptographic protocols, -calculus, veri cation The rst author works at Université de Provence, Marseille. and he is an external collaborator of the INRIA-Ecole des Mines Project Meije. He can be contacted at the following address: CMI, 39 rue JoliotCurie, F-13453, Marseille, France. mailto: [email protected]. He work was partly supported by Action Coopérative PRESYSA, IFCPAR 1502-1, LIM (CNRS ES-A6077), and WG Confer. The second author works at the Indian Institute of Technology, Delhi. mailto: [email protected]. He was partly supported by IFCPAR 1502-1 and AICTE 1-52/CD/CA(08)/96-97 and BRICS, Centre of the Danish National Research Foundation. Le jeu du nom dans les tables cryptographiques Résumé : Nous présentons un calcul avec passage de noms qui peut être consideré comme un -calcul simpli é equipé avec une table cryptographique. Il s'agit d'une structure de données qui représente les relations entre les noms. Nous appliquons le calcul à la modelisation et véri cation de proprietés de securité et authenticité dans les protocoles cryptographiques à clef symétrique. Suivant des approches classiques [8], nous formulons le problème de véri cation comme une proprieté d'accessibilité et nous prouvons sa decidabilité en supposant un nombre ni de principaux et une borne sur les sortes des messages synthétisés par l'attaquant. Mots-clés : Protocoles cryptographiques, -calcul, véri cation. The game of the name in cryptographic tables 3
منابع مشابه
Science and Sociology: Predictive Power is the Name of the Game, Sheldon Ekland-Olson & Jack P. Gibbs (2017), Routledge, ISBN 978-1-138-04784-6
متن کامل
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملحمایت نظام حقوق مالکیت فکری از حقوق بازیباز کنشگردر بازیهای رایانهای
Nowadays video games are fast becoming one of the most popular media of choice. For more than thirty years now video games are amongst us. At the start being a new form of entertainment for the youth only, in no time it has grown into a medium enjoyed and used for various purposes by consumers of all ages. The global market for video games is still expected to grow substantially in the upcoming...
متن کاملLightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کامل