Compiling and securing cryptographic protocols

被引:11
|
作者
Chevalier, Yannick [1 ]
Rusinowitch, Michael [1 ]
机构
[1] Loria, F-54506 Vandoeuvre Les Nancy, France
关键词
Formal methods; Cryptographic protocols; Safety/security in digital systems; Protocol compiling; Roles; Dolev Yao model; DECIDING KNOWLEDGE;
D O I
10.1016/j.ipl.2009.11.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
  • [1] Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols
    Goyal, Dinesh
    Kumar, Anil
    Gandhi, Yatin
    Khetani, Vinit
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 703 - 714
  • [2] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [3] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [4] Cryptography and cryptographic protocols
    Goldreich, O
    [J]. DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [5] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    [J]. TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [6] Cryptography and cryptographic protocols
    Oded Goldreich
    [J]. Distributed Computing, 2003, 16 : 177 - 199
  • [7] Cryptographic Methods for Securing the YML Framework
    Lv, Xin
    Petiton, Serge G.
    Shang, Ling
    Wang, Zhijian
    Xu, Feng
    [J]. 2012 1ST INTERNATIONAL CONFERENCE ON SYSTEMS AND COMPUTER SCIENCE (ICSCS), 2012,
  • [8] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [9] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    [J]. ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [10] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26