Abstract :
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular for establishing authentication. Our technique produces proofs by sequences of games, as standard in cryptography. These proofs are valid for a number of sessions polynomial in the security parameter, in the presence of an active adversary. Our technique can handle a wide variety of cryptographic primitives, including shared- and public-key encryption, signatures, message authentication codes, and hash functions. It has been implemented in the tool CryptoVerif and successfully tested on examples from the literature.
Keywords :
cryptographic protocols; file organisation; message authentication; public key cryptography; CryptoVerif tool; active adversary; computational model; computationally sound mechanized proofs; cryptographic protocols; hash functions; message authentication codes; parameter security; public-key encryption; Calculus; Computational modeling; Cryptographic protocols; Cryptography; Message authentication; Polynomials; Public key; Security; Testing; Turing machines;