A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated Security Proof for Symmetric Encryption Modes
[chapter]
2009
Lecture Notes in Computer Science
We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. ...
We were able to use our method to verify semantic security of several encryption modes including Cipher Block Chaining (CBC), Cipher Feedback mode (CFB), Output Feedback (OFB), and Counter mode (CTR). ...
Other works try to encode security of symmetric encryption modes as a non-interference property for programs with deterministic encryption. ...
doi:10.1007/978-3-642-10622-4_4
fatcat:hek353fjhnaxxhelvwrspmd2py
Automated Verification of Block Cipher Modes of Operation, an Improved Method
[chapter]
2012
Lecture Notes in Computer Science
In this paper, we improve on a previous result by Gagné et al. [11] for automatically proving the semantic security of symmetric modes of operation for block ciphers. ...
Our method can be used to verify the semantic security of all the encryption modes that could be proven secure in [11] , in addition to a few new modes, such as Propagating Cipher-Block Chaining (PCBC) ...
An extensive discussion on different security notions for symmetric encryption and a proof of the CBC mode of encryption is presented in [3] . ...
doi:10.1007/978-3-642-27901-0_3
fatcat:kvo2svcd4rhippcab3ra5ywgxq
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
2010
Journal of automated reasoning
Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. ...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. ...
The Cryp-toVerif tool can also be used not only to automate security proofs of protocols but also to automate security proofs of cryptographic primitives, reducing their security to standard cryptographic ...
doi:10.1007/s10817-010-9187-9
fatcat:6qrlhc34mnbnpmap2mkkrnfqhm
How Does C-V2X Help Autonomous Driving to Avoid Accidents?
2022
Sensors
The paper provides the system architecture, design logic, network topology, message flow, artificial intelligence (AI) and network security feature. ...
Accidents are continuously reported for autonomous driving vehicles including those with advanced sensors installed. ...
Meanwhile we provide the security support with software symmetric encryption in our solution, it is helpful for C-V2X deployment in early stage of some countries as proof of concept, which fills the research ...
doi:10.3390/s22020686
pmid:35062647
pmcid:PMC8779724
fatcat:fdho6yzudnasfmsilxv625rww4
Fully automated analysis of padding-based encryption in the computational model
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
Using the toolset in batch mode, we build a comprehensive database of encryption schemes that records attacks against insecure schemes, and proofs with concrete bounds for secure ones. ...
model, and a toolset that bundles together fully automated proof search and attack finding algorithms. ...
This result, originally proved for symmetric encryption, has since been extended to richer theories [15] . ...
doi:10.1145/2508859.2516663
dblp:conf/ccs/BartheCGKLSB13
fatcat:r5esat4qcbda3lt4izque4mshi
Automated Proofs of Block Cipher Modes of Operation
2015
Journal of automated reasoning
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. ...
We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates ...
An extensive discussion on different security notions for symmetric encryption and a proof of the CBC mode of encryption is presented in [BDJR97] . ...
doi:10.1007/s10817-015-9341-5
fatcat:aaht6mzcknan5i2s546yjjuhm4
Computationally sound mechanized proofs for basic and public-key Kerberos
2008
Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08
We prove authentication and key secrecy properties using the prover CryptoVerif, which works directly in the computational model; these are the first mechanical proofs of a full industrial protocol at ...
We are grateful to Michael Backes, Ricardo Corin, John Mitchell, Kenny Paterson, and Arnab Roy for helpful discussions. ...
The proof done by CryptoVerif consists essentially in applying, after some minor simplifications, the security assumptions on symmetric key encryption for each key kS, kT , and kC . ...
doi:10.1145/1368310.1368326
dblp:conf/ccs/BlanchetJST08
fatcat:nvjdqwa33jaxbdvlkpl4hqvf7m
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*
2002
Journal of Cryptology
This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption. ...
Block cipher modes of operation. Block ciphers are the most common building block for making symmetric encryption schemes. Two well-known ways to do this are CBC mode and CTR mode. ...
Formal approaches suggest such high-level reasoning principles, and even permit automated proofs. ...
doi:10.1007/s00145-001-0014-7
fatcat:wh6sak4ne5csrcdrjokbshnuxm
Reconciling Two Views of Cryptography
[chapter]
2000
Lecture Notes in Computer Science
This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption. ...
Block cipher modes of operation. Block ciphers are the most common building block for making symmetric encryption schemes. Two well-known ways to do this are CBC mode and CTR mode. ...
Formal approaches suggest such high-level reasoning principles, and even permit automated proofs. ...
doi:10.1007/3-540-44929-9_1
fatcat:qhvera5rc5fiff47edlay5wp74
Security Analysis of the W3C Web Cryptography API
[chapter]
2016
Lecture Notes in Computer Science
for the most part, there are nonetheless attacks on secret key material due to how key wrapping and usages are implemented. ...
We demonstrate how a formal analysis of the API using the modeling language AVISPA with a SAT solver demonstrates that while the API has no errors in basic API operations and maintains its security properties ...
AES-KW has received various criticisms, for example being inconsistent in its notions of security (requiring IND-CCA from a deterministic mode), but though it has no public security proof, it has no known ...
doi:10.1007/978-3-319-49100-4_5
fatcat:mzooub23indp3nar2afh4evbqq
European Broadcasting Union
1976
SMPTE Journal
AES Advanced Encryption Standard, fast symmetric encryption standard. Table. ...
BISS1 enabled broadcasters to combine equipment from several vendors, while making systems more future proof. Since then, requirements for secure media transmission have evolved. ...
doi:10.5594/j13283
fatcat:s6f5yg3kjrejbhmhj6wc2ekbim
Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction
2013
International Journal of Computer Applications
So as a result an applied approach is presented to design a data security mechanism for which users will use message itself as a One Time Pad and El Gamal Cryptosystem to initiate the operations and subsequent ...
steps will involve simple XOR operations for cryptographic purpose. ...
Data Flow in proposed model Now proof systems for cryptographic validation and significance for both the El Gamal Encryption and XOR operation is well established in various cryptographic literatures so ...
doi:10.5120/13002-0118
fatcat:5cw6sbjfdjaebbpk55mn6w4354
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
[article]
2021
arXiv
pre-print
As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. ...
We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. ...
In this paper we consider the security of platooning as a starting point to investigate automated security proofs, partially ordered key structures, and the process of transforming informal and semi-formal ...
arXiv:2105.02664v2
fatcat:st2ykgpkanctvp2rcvwiec6yum
A Multiple End-Devices Authentication Scheme for LoRaWAN
2022
Electronics
The proposed authentication system is formally secure against the server and end-device impersonation. In addition, we assess the authentication overhead and compare it to the standard approach. ...
When an end-device joins the LoRaWAN network, it must send a join request message to the network server and wait for the network server to verify such request under the current LoRaWAN join protocol. ...
Acknowledgments: This research was partially supported by Taiwan Information Security Center at National Sun Yat-sen University (TWISC@NSYSU). ...
doi:10.3390/electronics11050797
fatcat:wbtdy7yu5jhufa4rkrkk3soxpe
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
2011
IEICE transactions on information and systems
This paper proposes a robust authentication scheme for the remote autonomous object based on AES (Advanced Encryption Standard) symmetric cryptosystem. ...
Compared with related schemes, the proposed scheme not only resists various security attacks but also provides computation and communication efficiency. ...
Acknowledgment We would like to thank the anonymous reviewers for their helpful comments. ...
doi:10.1587/transinf.e94.d.1113
fatcat:movkqnpapzfm5gxliutmpos73u
« Previous
Showing results 1 — 15 out of 2,465 results