Filters








2,465 Hits in 4.1 sec

Automated Security Proof for Symmetric Encryption Modes [chapter]

Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
2009 Lecture Notes in Computer Science  
We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers.  ...  We were able to use our method to verify semantic security of several encryption modes including Cipher Block Chaining (CBC), Cipher Feedback mode (CFB), Output Feedback (OFB), and Counter mode (CTR).  ...  Other works try to encode security of symmetric encryption modes as a non-interference property for programs with deterministic encryption.  ... 
doi:10.1007/978-3-642-10622-4_4 fatcat:hek353fjhnaxxhelvwrspmd2py

Automated Verification of Block Cipher Modes of Operation, an Improved Method [chapter]

Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
2012 Lecture Notes in Computer Science  
In this paper, we improve on a previous result by Gagné et al. [11] for automatically proving the semantic security of symmetric modes of operation for block ciphers.  ...  Our method can be used to verify the semantic security of all the encryption modes that could be proven secure in [11] , in addition to a few new modes, such as Propagating Cipher-Block Chaining (PCBC)  ...  An extensive discussion on different security notions for symmetric encryption and a proof of the CBC mode of encryption is presented in [3] .  ... 
doi:10.1007/978-3-642-27901-0_3 fatcat:kvo2svcd4rhippcab3ra5ywgxq

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Véronique Cortier, Steve Kremer, Bogdan Warinschi
2010 Journal of automated reasoning  
Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs.  ...  Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability.  ...  The Cryp-toVerif tool can also be used not only to automate security proofs of protocols but also to automate security proofs of cryptographic primitives, reducing their security to standard cryptographic  ... 
doi:10.1007/s10817-010-9187-9 fatcat:6qrlhc34mnbnpmap2mkkrnfqhm

How Does C-V2X Help Autonomous Driving to Avoid Accidents?

Lili Miao, Shang-Fu Chen, Yu-Ling Hsu, Kai-Lung Hua
2022 Sensors  
The paper provides the system architecture, design logic, network topology, message flow, artificial intelligence (AI) and network security feature.  ...  Accidents are continuously reported for autonomous driving vehicles including those with advanced sensors installed.  ...  Meanwhile we provide the security support with software symmetric encryption in our solution, it is helpful for C-V2X deployment in early stage of some countries as proof of concept, which fills the research  ... 
doi:10.3390/s22020686 pmid:35062647 pmcid:PMC8779724 fatcat:fdho6yzudnasfmsilxv625rww4

Fully automated analysis of padding-based encryption in the computational model

Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Using the toolset in batch mode, we build a comprehensive database of encryption schemes that records attacks against insecure schemes, and proofs with concrete bounds for secure ones.  ...  model, and a toolset that bundles together fully automated proof search and attack finding algorithms.  ...  This result, originally proved for symmetric encryption, has since been extended to richer theories [15] .  ... 
doi:10.1145/2508859.2516663 dblp:conf/ccs/BartheCGKLSB13 fatcat:r5esat4qcbda3lt4izque4mshi

Automated Proofs of Block Cipher Modes of Operation

Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini
2015 Journal of automated reasoning  
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation.  ...  We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates  ...  An extensive discussion on different security notions for symmetric encryption and a proof of the CBC mode of encryption is presented in [BDJR97] .  ... 
doi:10.1007/s10817-015-9341-5 fatcat:aaht6mzcknan5i2s546yjjuhm4

Computationally sound mechanized proofs for basic and public-key Kerberos

B. Blanchet, A. D. Jaggard, A. Scedrov, J.-K. Tsay
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model; these are the first mechanical proofs of a full industrial protocol at  ...  We are grateful to Michael Backes, Ricardo Corin, John Mitchell, Kenny Paterson, and Arnab Roy for helpful discussions.  ...  The proof done by CryptoVerif consists essentially in applying, after some minor simplifications, the security assumptions on symmetric key encryption for each key kS, kT , and kC .  ... 
doi:10.1145/1368310.1368326 dblp:conf/ccs/BlanchetJST08 fatcat:nvjdqwa33jaxbdvlkpl4hqvf7m

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*

Martín Abadi, Phillip Rogaway
2002 Journal of Cryptology  
This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption.  ...  Block cipher modes of operation. Block ciphers are the most common building block for making symmetric encryption schemes. Two well-known ways to do this are CBC mode and CTR mode.  ...  Formal approaches suggest such high-level reasoning principles, and even permit automated proofs.  ... 
doi:10.1007/s00145-001-0014-7 fatcat:wh6sak4ne5csrcdrjokbshnuxm

Reconciling Two Views of Cryptography [chapter]

Martí;n Abadi, Phillip Rogaway
2000 Lecture Notes in Computer Science  
This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption.  ...  Block cipher modes of operation. Block ciphers are the most common building block for making symmetric encryption schemes. Two well-known ways to do this are CBC mode and CTR mode.  ...  Formal approaches suggest such high-level reasoning principles, and even permit automated proofs.  ... 
doi:10.1007/3-540-44929-9_1 fatcat:qhvera5rc5fiff47edlay5wp74

Security Analysis of the W3C Web Cryptography API [chapter]

Kelsey Cairns, Harry Halpin, Graham Steel
2016 Lecture Notes in Computer Science  
for the most part, there are nonetheless attacks on secret key material due to how key wrapping and usages are implemented.  ...  We demonstrate how a formal analysis of the API using the modeling language AVISPA with a SAT solver demonstrates that while the API has no errors in basic API operations and maintains its security properties  ...  AES-KW has received various criticisms, for example being inconsistent in its notions of security (requiring IND-CCA from a deterministic mode), but though it has no public security proof, it has no known  ... 
doi:10.1007/978-3-319-49100-4_5 fatcat:mzooub23indp3nar2afh4evbqq

European Broadcasting Union

1976 SMPTE Journal  
AES Advanced Encryption Standard, fast symmetric encryption standard. Table.  ...  BISS1 enabled broadcasters to combine equipment from several vendors, while making systems more future proof. Since then, requirements for secure media transmission have evolved.  ... 
doi:10.5594/j13283 fatcat:s6f5yg3kjrejbhmhj6wc2ekbim

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

Sohit Kumar, Ashish Vashisth
2013 International Journal of Computer Applications  
So as a result an applied approach is presented to design a data security mechanism for which users will use message itself as a One Time Pad and El Gamal Cryptosystem to initiate the operations and subsequent  ...  steps will involve simple XOR operations for cryptographic purpose.  ...  Data Flow in proposed model Now proof systems for cryptographic validation and significance for both the El Gamal Encryption and XOR operation is well established in various cryptographic literatures so  ... 
doi:10.5120/13002-0118 fatcat:5cw6sbjfdjaebbpk55mn6w4354

Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol [article]

Felipe Boeira, Mikael Asplund
2021 arXiv   pre-print
As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing.  ...  We tackle the complexity of the resulting model with a proof strategy based on a relation on keys.  ...  In this paper we consider the security of platooning as a starting point to investigate automated security proofs, partially ordered key structures, and the process of transforming informal and semi-formal  ... 
arXiv:2105.02664v2 fatcat:st2ykgpkanctvp2rcvwiec6yum

A Multiple End-Devices Authentication Scheme for LoRaWAN

Chun-I Fan, Er-Shuo Zhuang, Arijit Karati, Chun-Hui Su
2022 Electronics  
The proposed authentication system is formally secure against the server and end-device impersonation. In addition, we assess the authentication overhead and compare it to the standard approach.  ...  When an end-device joins the LoRaWAN network, it must send a join request message to the network server and wait for the network server to verify such request under the current LoRaWAN join protocol.  ...  Acknowledgments: This research was partially supported by Taiwan Information Security Center at National Sun Yat-sen University (TWISC@NSYSU).  ... 
doi:10.3390/electronics11050797 fatcat:wbtdy7yu5jhufa4rkrkk3soxpe

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System

Eun-Jun YOON, Il-Soo JEON, Kee-Young YOO
2011 IEICE transactions on information and systems  
This paper proposes a robust authentication scheme for the remote autonomous object based on AES (Advanced Encryption Standard) symmetric cryptosystem.  ...  Compared with related schemes, the proposed scheme not only resists various security attacks but also provides computation and communication efficiency.  ...  Acknowledgment We would like to thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1587/transinf.e94.d.1113 fatcat:movkqnpapzfm5gxliutmpos73u
« Previous Showing results 1 — 15 out of 2,465 results