Cryptographic Protocol Engineering-Building Security from the Ground Up

نویسنده

  • Jim Alves-Foss
چکیده

There are several types of attacks, including multi-protocol attacks, that occur when incorrect assumptions are made about the operating environment of a cryptographic protocol. This paper introduces the concept of a protocol service layer providing separation between cryptographic services and their uses. This layer implements the necessary security functions needed to implement the secure environment assumed by many protocol designers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications

We develop an approach to deriving concrete engineering advice for cryptographic protocols from provablesecurity-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Security engineering - a guide to building dependable distributed systems

Security Engineering: A Guide to Building Dependable Distributed Systems Ross Anderson Wiley Computer Publishing This is an upper-level undergraduate, first-year graduate course on network and computer security. This course introduces the principles and practices of cryptography and network security. The first half of the class content covers basic cryptographic methods, key distribution, and p...

متن کامل

Multi-Dimensional Security Protocol Engineering using SPEAR

Multi-dimensional security analysis is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, is a protocol engineering tool which focuses on security protocols, with the specific aim of producing secure and effi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000