A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS

被引:0
|
作者
WATANABE, H
FUJIWARA, T
KASAMI, T
机构
关键词
COMPUTER SECURITY; CRYPTOGRAPHIC PROTOCOL; PROTOCOL VERIFICATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is difficult to decide whether or not a given cryptographic protocol is secure even though the cryptographic algorithm used for the protocol is assumed to be secure. We have proposed an algorithm to decide the security of cryptographic protocols under several conditions. In this paper, we review our algorithm and report a system to verify the security. The system has be implemented on a computer. By using this system, we have verified the security of several protocols efficiently.
引用
收藏
页码:96 / 103
页数:8
相关论文
共 50 条
  • [21] Deciding knowledge in security protocols under equational theories
    Abadi, Martin
    Cortier, Veronique
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 2 - 32
  • [22] Deciding knowledge in security protocols under equational theories
    Abadi, M
    Cortier, V
    [J]. AUTOMATA , LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2004, 3142 : 46 - 58
  • [23] Deciding knowledge in security protocols for monoidal equational theories
    Cortier, Veronique
    Delaune, Stephanie
    [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2007, 4790 : 196 - +
  • [24] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    [J]. 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [25] Cryptographic Protocols' Performance and Network Layer Security of RSMAD
    Sokol, Marcin
    Gajewski, Slawomir
    Gajewska, Malgorzata
    [J]. 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
  • [26] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [27] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [28] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [29] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    Popova, Elena
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [30] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546