Formal methods and cryptography

被引:0
|
作者
Backes, Michael [1 ]
Pfitzmann, Birgit
Waidner, Michael
机构
[1] Univ Saarland, D-6600 Saarbrucken, Germany
[2] IBM Res, Ruschlikon, Switzerland
[3] IBM Software Grp, Somers, NY USA
来源
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsystems are probabilistic and in most cases computational. Hence it is not obvious how one can treat cryptographic subsystems in a sound way within formal methods, in particular if one does not want to encumber the proof of an overall system by probabilities and computational restrictions due only to its cryptographic subsystems. We survey our progress on integrating cryptography into formal models, in particular our work on reactive simulatability (RSIM), a refinement notion suitable for cryptography. We also present the underlying system model which unifies a computational and a more abstract presentation and allows generic distributed scheduling. We show the relation of RSIM and other types of specifications, and clarify what role the classical Dolev-Yao (term algebra) abstractions from cryptography can play in the future.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 50 条
  • [31] Aspects and formal methods
    Katz, Shmuel
    [J]. FM 2008: FORMAL METHODS, PROCEEDINGS, 2008, 5014 : 1 - +
  • [32] Formal methods in computation
    Moller, FG
    [J]. COMPUTER JOURNAL, 2002, 45 (01): : 1 - 1
  • [33] Overview of Formal Methods
    Wang, Ji
    Zhan, Nai-Jun
    Feng, Xin-Yu
    Liu, Zhi-Ming
    [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (01): : 33 - 61
  • [34] Formal methods in practice
    Polak, W
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2002, 42 (01) : 75 - 85
  • [35] Formal Methods at Scale
    Martin, William
    Lincoln, Patrick
    Scherlis, William
    [J]. IEEE SECURITY & PRIVACY, 2022, 20 (03) : 22 - 23
  • [36] An invitation to formal methods
    Saiedian, H
    Bowen, JP
    Butler, RW
    Dill, DL
    Glass, RL
    Gries, D
    Hall, A
    Hinchey, MG
    Holloway, CM
    Jackson, D
    Jones, CB
    Lutz, MJ
    Parnas, DL
    Rushby, J
    Wing, J
    Zave, P
    [J]. COMPUTER, 1996, 29 (04) : 16 - &
  • [37] Preface for the formal methods in system design special issue on ‘Formal Methods 2021’
    Marieke Huisman
    Corina S. Păsăreanu
    Naijun Zhan
    [J]. Formal Methods in System Design, 2022, 61 : 1 - 2
  • [38] Preface for the formal methods in system design special issue on 'Formal Methods 2021'
    Huisman, Marieke
    Pasareanu, Corina S.
    Zhan, Naijun
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2022, 61 (01) : 1 - 2
  • [39] The meaning of "formal": From weak to strong formal methods
    Wolper P.
    [J]. International Journal on Software Tools for Technology Transfer, 1997, 1 (1-2) : 6 - 8
  • [40] Editorial: Special Issue on Mathematical Methods for Cryptography
    Budaghyan, Lilya
    Li, Chunlei
    Parker, Matthew G.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (03): : 363 - 365