Taming the Adversary
نویسنده
چکیده
While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the explanations are informal; others are embodied in formal methods, particularly in formal methods for the analysis of security protocols. This note (intended to accompany a talk at the Crypto 2000 conference) describes some of those explanations. It focuses on simple models of attacks, pointing to partial justifications of these models. 1 Polite Adversaries Some of the simplest explanations of cryptography rely on analogies with physical objects, such as safes, locks, and sealed envelopes. These explanations are certainly simplistic. Nevertheless, and in spite of the sophistication of modern cryptology, these and other simplifications can be helpful when used appropriately. The simplifications range from informal metaphors to rigorous abstract models, and include frequent omissions of detail and conceptual conflations (e.g., [28]). They commonly appear in descriptions of systems that employ cryptography, in characterizations of attackers, and correspondingly in statements of security properties. They are sometimes deceptive and dangerous. However, certain simplifications can be justified: – on pragmatic grounds, when the simplifications enable reasoning (even automated reasoning) that leads to better understanding of systems, yielding increased confidence in some cases and the discovery of weaknesses in others; – on theoretical grounds, when the simplifications do not hide security flaws (for example, when it can be proved that a simple attacker is as powerful as an arbitrary one). In particular, in the design and study of security protocols, it is typical to adopt models that entail sensible but substantial simplifying restrictions on attackers. (See for example [13] and most of the references below.) In these models, an adversary may perform the same operations as other principals. For example, all principals, including the adversary, may be allowed to send and receive messages. If the protocol relies explicitly on cryptography, all principals may be allowed to perform cryptographic operations; thus, the adversary may generate keys, encrypt, decrypt, sign, verify signatures, and hash. In addition, the
منابع مشابه
First as Farce, Then as Filmfarsi: Film Adaptation of Shakespeare’s The Taming of the Shrew in Iran
This article is concerned with William Shakespeare’s famous farce play The Taming of the Shrew and its Persian adaptation as an Iranian film called Gorbe ra dame Hejleh Mikoshand in 1969. The point that informs the inquiry is the way the film departs and differs from the play in relation to the issue of women within the patriarchal society. The play and the film will be examined separately in d...
متن کاملTaming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymization techniques with respect to the privacy they afford. In fact, recent work suggests that many state-of-the-art anonymization techniques may leak more information than first thought. In this paper, we propose techniqu...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملTowards Taming Privilege-Escalation Attacks on Android
Android’s security framework has been an appealing subject of research in the last few years. Android has been shown to be vulnerable to application-level privilege escalation attacks, such as confused deputy attacks, and more recently, attacks by colluding applications. While most of the proposed approaches aim at solving confused deputy attacks, there is still no solution that simultaneously ...
متن کاملTaming Evasions in Machine Learning Based Detection Pipelines
Taming Evasions in Machine Learning Based Detection Pipelines
متن کامل