Security-typed languages for implementation of cryptographic protocols: A case study

被引:0
|
作者
Askarov, A [1 ]
Sabelfeld, A [1 ]
机构
[1] Chalmers, Dept Comp Sci, S-41296 Gothenburg, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are critical for protecting modem communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are, based on a case study using Jif, a Java-based security-typed language, for implementing a non-trivial cryptographic protocol that allows playing online poker without a trusted third party. The case study deploys the largest program written in a security-typed language to date and identifies insights ranging from security guarantees to useful patterns of secure programming.
引用
收藏
页码:197 / 221
页数:25
相关论文
共 50 条
  • [41] A FRAMEWORK FOR THE STUDY OF CRYPTOGRAPHIC PROTOCOLS
    BERGER, R
    KANNAN, S
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 87 - 103
  • [42] Analyzing cryptographic protocols to strengthen HR information security
    Priya, R.
    Selvakumari, R.
    Chandrakala, K. R.
    Krithika, S.
    Rai, Hemangine
    Muthukrishnan, K. Binith
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (08): : 2495 - 2509
  • [43] Cryptographic Protocols' Performance and Network Layer Security of RSMAD
    Sokol, Marcin
    Gajewski, Slawomir
    Gajewska, Malgorzata
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
  • [44] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K. V.
    Balachandra, Mamatha
    IEEE ACCESS, 2024, 12 : 183792 - 183808
  • [45] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [46] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [47] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [48] On the secure implementation of security protocols
    Giambiagi, P
    Dam, M
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 144 - 158
  • [49] On the secure implementation of security protocols
    Giambiagi, P
    Dam, M
    SCIENCE OF COMPUTER PROGRAMMING, 2004, 50 (1-3) : 73 - 99
  • [50] Panel on languages for formal specification of security protocols
    Meadows, C
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 96 - 96