Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Cortier, Véroniquea; * | Delaune, Stéphanieb; c | Lafourcade, Pascalc; d
Affiliations: [a] LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique – BP 239, 54506 Vandoeuvre-les-Nancy cedex, France. E-mail: cortier@loria.fr | [b] France Télécom R&D, France | [c] Laboratoire Spécification et Vérification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Président Wilson, 94235 Cachan cedex, France. E-mail: delaune@lsv.ens-cachan.fr, lafourca@lsv.ens-cachan.fr | [d] LIF, Université Aix-Marseille 1 and CNRS UMR 6166, 39, r. Joliot-Curie, 13453 Marseille Cedex 13, France
Correspondence: [*] Corresponding author: Véronique Cortier, LORIA, CNRS and INRIA Lorraine project CASSIS, Campus Scientifique – BP 239, 54506 Vandoeuvre-les-Nancy cedex, France, Tel.: +33 3 83 59 30 55; Fax: +33 3 83 41 30 79; E-mail: cortier@loria.fr.
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.
Keywords: Cryptographic protocols, algebraic properties, decidability results, exclusive or, Abelian group, modular exponentiation, elliptic curves
DOI: 10.3233/JCS-2006-14101
Journal: Journal of Computer Security, vol. 14, no. 1, pp. 1-43, 2006
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl