Algebra model and security analysis for cryptographic protocols

被引:0
|
作者
Jinpeng Huai
Xianxian Li
机构
[1] Beijing University of Aeronautics and Astronautics,School of Computer
关键词
cryptographic protocol; formal analysis; information security; algebra system;
D O I
暂无
中图分类号
学科分类号
摘要
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant’s knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.
引用
收藏
页码:199 / 220
页数:21
相关论文
共 50 条
  • [1] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [2] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [3] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [4] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [5] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
  • [6] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [7] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [8] Security and composition of multiparty cryptographic protocols
    Canetti, R
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [9] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    [J]. Journal of Cryptology, 2000, 13 : 143 - 202
  • [10] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82