Formal methods and cryptography

被引:0
|
作者
Backes, Michael [1 ]
Pfitzmann, Birgit
Waidner, Michael
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] IBM Res, Ruschlikon, Switzerland
[3] IBM Software Grp, Somers, NY USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsystems are probabilistic and in most cases computational. Hence it is not obvious how one can treat cryptographic subsystems in a sound way within formal methods, in particular if one does not want to encumber the proof of an overall system by probabilities and computational restrictions due only to its cryptographic subsystems. We survey our progress on integrating cryptography into formal models, in particular our work on reactive simulatability (RSIM), a refinement notion suitable for cryptography. We also present the underlying system model which unifies a computational and a more abstract presentation and allows generic distributed scheduling. We show the relation of RSIM and other types of specifications, and clarify what role the classical Dolev-Yao (term algebra) abstractions from cryptography can play in the future.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 50 条
  • [1] THE FORMAL STUDY OF QUANTUM CRYPTOGRAPHY PROTOCOLS
    Yang, Fan
    Hao, Yu-Jie
    [J]. 2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 29 - 33
  • [2] Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation
    Brain, Martin
    Cid, Carlos
    Player, Rachel
    Robson, Wrenna
    [J]. CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 21 - 36
  • [3] FORMAL LANGUAGE IDENTITY-BASED CRYPTOGRAPHY
    Vecsi, Adam
    Petho, Attila
    [J]. RAD HRVATSKE AKADEMIJE ZNANOSTI I UMJETNOSTI-MATEMATICKE ZNANOSTI, 2021, 25 (546): : 143 - 159
  • [4] Statistical Methods for Cryptography
    Rizzi, Alfredo
    [J]. DATA ANALYSIS AND CLASSIFICATION, 2010, : 13 - 21
  • [5] Card-Based Cryptography Meets Formal Verification
    Koch, Alexander
    Schrempp, Michael
    Kirsten, Michael
    [J]. NEW GENERATION COMPUTING, 2021, 39 (01) : 115 - 158
  • [6] Card-Based Cryptography Meets Formal Verification
    Alexander Koch
    Michael Schrempp
    Michael Kirsten
    [J]. New Generation Computing, 2021, 39 : 115 - 158
  • [7] Cryptography as a formal method and model for security in electronic payments
    Tsiakis, T
    Stephanides, G
    Pekos, G
    [J]. INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 235 - 242
  • [8] Card-Based Cryptography Meets Formal Verification
    Koch, Alexander
    Schrempp, Michael
    Kirsten, Michael
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 488 - 517
  • [9] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    [J]. CYBERNETICS AND SYSTEMS, 2023,
  • [10] Research on Visual Cryptography Methods
    Shanmugasundari, T.
    Subban, Ravi
    Shanmugamoorthy, Saraswathi
    Manogari, S.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 975 - 980