Security-typed languages for implementation of cryptographic protocols: A case study

被引:0
|
作者
Askarov, A [1 ]
Sabelfeld, A [1 ]
机构
[1] Chalmers, Dept Comp Sci, S-41296 Gothenburg, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are critical for protecting modem communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are, based on a case study using Jif, a Java-based security-typed language, for implementing a non-trivial cryptographic protocol that allows playing online poker without a trusted third party. The case study deploys the largest program written in a security-typed language to date and identifies insights ranging from security guarantees to useful patterns of secure programming.
引用
收藏
页码:197 / 221
页数:25
相关论文
共 50 条
  • [31] Cognitive and biologically cryptographic protocols for data security
    Ogiela, Lidia
    Ogiela, Urszula
    COGNITIVE SYSTEMS RESEARCH, 2019, 56 : 1 - 6
  • [32] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [33] Security Evaluation Over Lightweight Cryptographic Protocols
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
  • [34] A NEW METHOD FOR ANALYZING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    TOUSSAINT, MJ
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 702 - 714
  • [35] A cryptographic model for branching time security properties - The case of contract signing protocols
    Cortier, Veronique
    Kuesters, Ralf
    Warinschi, Bogdan
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 422 - 437
  • [36] Challenges for Security Typed Web Scripting Languages Design
    Hassan, Doaa
    El-Kassas, Sherif
    Ziedan, Ibrahim
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 227 - 230
  • [37] Challenges for Security Typed Web Scripting Languages Design
    Hassan, Doaa
    El-Kassas, Sherif
    Ziedan, Ibrahim
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 493 - 499
  • [38] Cooperative Model Reconstruction for Cryptographic Protocols Using Visual Languages
    Weyers, Benjamin
    Luther, Wolfram
    Baloian, Nelson
    GROUPWARE-DESIGN: IMPLEMENTATION, AND USE, PROCEEDINGS, 2009, 5784 : 311 - +
  • [39] Security of RFID Protocols - A Case Study
    van Deursen, Ton
    Radomirovic, Sasa
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 244 : 41 - 52
  • [40] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105