Title :
Symmetric encryption in automatic analyses for confidentiality against active adversaries
Author_Institution :
Tartu Univ., Estonia
Abstract :
In this article we present a technique for static analysis, correct with respect to complexity-theoretic definitions of security, of cryptographic protocols for checking whether these protocols satisfy confidentiality properties. The approach is similar to Abadi and Rogaway - we define patterns for cryptographic protocols (they did it for formal expressions), such that the protocol is secure iff the patterns are. We then statically analyse the patterns, they should be easier to analyse than the protocols themselves. We consider symmetric encryption as the cryptographic primitive in protocols. Handling this primitive has so far received comparatively less attention in approaches striving to unite the formal and computational models of cryptography.
Keywords :
cryptography; program diagnostics; protocols; complexity-theoretic security definitions; computational cryptography models; cryptographic primitive; cryptographic protocols patterns; formal cryptography models; static analysis; symmetric encryption; Algebra; Computational modeling; Computer security; Cryptographic protocols; Cryptography; Information security; Labeling; Pattern analysis;
Conference_Titel :
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on
Print_ISBN :
0-7695-2136-3
DOI :
10.1109/SECPRI.2004.1301316