Cryptographic Protocol Engineering-Building Security from the Ground Up
نویسنده
چکیده
There are several types of attacks, including multi-protocol attacks, that occur when incorrect assumptions are made about the operating environment of a cryptographic protocol. This paper introduces the concept of a protocol service layer providing separation between cryptographic services and their uses. This layer implements the necessary security functions needed to implement the secure environment assumed by many protocol designers.
منابع مشابه
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملProvable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications
We develop an approach to deriving concrete engineering advice for cryptographic protocols from provablesecurity-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملSecurity engineering - a guide to building dependable distributed systems
Security Engineering: A Guide to Building Dependable Distributed Systems Ross Anderson Wiley Computer Publishing This is an upper-level undergraduate, first-year graduate course on network and computer security. This course introduces the principles and practices of cryptography and network security. The first half of the class content covers basic cryptographic methods, key distribution, and p...
متن کاملMulti-Dimensional Security Protocol Engineering using SPEAR
Multi-dimensional security analysis is effective in creating cryptographic protocols since it encompasses a variety of analysis techniques, thereby providing a higher security confidence than individual approaches. SPEAR, the Security Protocol Engineering and Analysis Resource, is a protocol engineering tool which focuses on security protocols, with the specific aim of producing secure and effi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000