Security proofs of cryptographic protocols

نویسنده

  • Eva Jencusova
چکیده

We live in time of computers and scientific and technological progress but this time is also marked with many attacks on big Internet companies. So with expand of Internet people start to protect information that they exchange through Internet. In the Internet world it is necessary for systems as Internet banking, Internet shopping or e-commerce to secure private information that are transferred via Internet. This necessity leads to design security improvements of existing protocols and to design and implement cryptographic algorithms (for example protocols as L2TP, Microsoft PPTP, IPSec, SSH or algorithms as DES, Blowfish and others). Consider that we have two banks, bank “ Alice” and bank “ Bob” and these two banks for business purposes need the private cipher for their communication. They need this cipher to do secret bank operation. So they need the secure way, how to arrange the cipher. For this purpose the designers designed the communication protocols. But the both banks “ Alice” and “ Bob” must be sure that no one can achieve this cipher by negotiation and both must be sure that they talk with the cipher one with the other. And such proofs about communicating protocols can be done only with the security analysis. So it is not enough to design any “ security” protocol or cryptographic algorithm, more important is to prove that protocol is really secure. In the world of informaticians and designers it must be developed new methods and formalisms that give us exact proofs of correctness and soundness of security protocols and cryptographic algorithms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications

We develop an approach to deriving concrete engineering advice for cryptographic protocols from provablesecurity-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.

متن کامل

Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library

Protocol security analysis has become an active research topic in recent years. Researchers have been trying to build sufficient theories for building automated tools, which give security proofs for cryptographic protocols. There are two approaches for analysing protocols: formal and computational. The former, often called Dolev-Yao style, uses abstract terms to model cryptographic messages wit...

متن کامل

Security Proofs for Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques

This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. We provide a formal model, and supply a deenition of the goals within this model. We prove our protocols correct within this framework, given the existence of certain cryptographic primitives. The practical implementat...

متن کامل

Pairing-Based Cryptographic Protocols : A Survey

The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves have recently been found applications in design of cryptographic protocols. In this survey, we have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models.

متن کامل

Automatic Approach of Provable Security

Abstract:Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper introduces the game-based approach of writing security proofs and its automatic technique. It advocates the automatic security proof approach based on process calculus, and presents the initial game and observati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2002  شماره 

صفحات  -

تاریخ انتشار 2002