Design and Verification of a Crypto-Agile Distributed Key Manager
ثبت نشده
چکیده
We present DKM, a distributed key management system. DKM implements a new data protection API. It manages cryptographic keys and policies on behalf of groups of users that share the data. To ensure long-term protection, DKM supports cryptographic agility: algorithms, keys, and policies can evolve for protecting fresh data while preserving access to old data. DKM is written in C# and currently used by several large datacenter applications. To verify our design and implementation, we also write a lightweight reference implementation of DKM in F#. This code closes the gap between formal models and production code: • Formally, the F# code is a very precise model of DKM: we automatically verify its security properties against new symbolic libraries for cryptographic agility, using the refinement typechecker F7 coupled with a model checker. • Experimentally, this code closely follows the structure of our production code: we automatically test that the corresponding F# and C# code fragments are interchangeable and yield the same results. We also report on several problems we uncovered and fixed as part of this joint design, development, and verification process.
منابع مشابه
Supply chain network design problem for a new market opportunity in an agile manufacturing system
The characteristics of today's competitive environment, such as the speed with which products are designed, manufactured, and distributed, and the need for higher responsiveness and lower operational cost, are forcing companies to search for innovative ways to do business. The concept of agile manufacturing has been proposed in response to these challenges for companies. This ...
متن کاملA novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective
Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...
متن کاملA novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective
Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...
متن کاملبررسی تاثیر فناوری اطلاعات بر چابکی شرکتهای کوچک و متوسط
Due to unexpected changes in today's business world, companies should be agile to exploit the best opportunities. This capability helps them to explore, adapt and respond to the unanticipated changes to get a better place in the competitive market. Agility is a set of capabilities and competencies that an organization needs in order to thrive and prosper in a continuously changing business envi...
متن کاملSpecifying and Verifying Crypto-Protocols at the Design Level
The clear semantics of Abstract State Machines is tailored to the analysis of crypto-protocols in a realistic environment threatened by an active eavesdropper. The model is intermediate between the abstract approaches based on belief logics, and the lower level approaches based on traces of atomic actions. Properties are stated at the design level with little formal overhead, but reasoning abou...
متن کامل