Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Cortier, Véroniquea; * | Delaune, Stéphanieb; c | Lafourcade, Pascalc; d
Affiliations: [a] LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique – BP 239, 54506 Vandoeuvre-les-Nancy cedex, France. E-mail: [email protected] | [b] France Télécom R&D, France | [c] Laboratoire Spécification et Vérification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, avenue du Président Wilson, 94235 Cachan cedex, France. E-mail: [email protected], [email protected] | [d] LIF, Université Aix-Marseille 1 and CNRS UMR 6166, 39, r. Joliot-Curie, 13453 Marseille Cedex 13, France
Correspondence: [*] Corresponding author: Véronique Cortier, LORIA, CNRS and INRIA Lorraine project CASSIS, Campus Scientifique – BP 239, 54506 Vandoeuvre-les-Nancy cedex, France, Tel.: +33 3 83 59 30 55; Fax: +33 3 83 41 30 79; E-mail: [email protected].
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.
Keywords: Cryptographic protocols, algebraic properties, decidability results, exclusive or, Abelian group, modular exponentiation, elliptic curves
DOI: 10.3233/JCS-2006-14101
Journal: Journal of Computer Security, vol. 14, no. 1, pp. 1-43, 2006
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]