Filters








426 Hits in 3.7 sec

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version) [article]

Moses D. Liskov and Joshua D. Guttman and John D. Ramsdell and Paul D. Rowe and F. Javier Thayer
2018 arXiv   pre-print
In this paper, we describe how to analyze protocols using the Diffie-Hellman mechanism for key agreement (DH) in the enrich-by-need style.  ...  Enrich-by-need protocol analysis is a style of symbolic protocol analysis that characterizes all executions of a protocol that extend a given scenario.  ...  Enrich-by-need protocol analysis identifies all essentially different smallest executions compatible with the scenario of interest.  ... 
arXiv:1804.05713v1 fatcat:a5zgfi2ptrfe7gnri5vi6rsnsy

Analysis and design of active IC metering schemes

Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede
2009 2009 IEEE International Workshop on Hardware-Oriented Security and Trust  
Active hardware metering schemes try to counter piracy of integrated circuits by enforcing the fabrication plant to run an activation protocol with the IP owner for every chip that is produced.  ...  In this work, we analyze the protocols of two active hardware metering schemes that were recently proposed by Roy et al. in [1], [2].  ...  ACKNOWLEDGMENTS This work was in part supported by the IAP Program P6/26 BCRYPT of the Belgian State, by K.U.Leuven-BOF funding (OT/06/04), by the FWO project G.0300.07 (Security components for trusted  ... 
doi:10.1109/hst.2009.5224964 dblp:conf/host/MaesSTV09 fatcat:ztobilkk2jaczb6lnra4h35hb4

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
We demonstrate our methodology by implementing and analyzing a variant of the popular Signal Protocol with only minor differences.  ...  The protocol is implemented in ProScript, a new domain-specific language that is designed for writing cryptographic protocol code that can both be executed within JavaScript programs and automatically  ...  This work was funded by the following grants: ERC CIRCUS, EU NEXTLEAP, and ANR AJACS.  ... 
doi:10.1109/eurosp.2017.38 dblp:conf/eurosp/KobeissiBB17 fatcat:jc3mdwujmzd2rhtzd3262sn2ca

Secure Protocol Composition

Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
2003 Electronical Notes in Theoretical Computer Science  
This paper continues the program initiated in [5] , towards a derivation system for security protocols.  ...  The present paper proposes rules for composing security protocols from given security components.  ...  In order to reason about the security property of this protocol, the term language and the protocol logic have to be enriched to allow reasoning about Diffie-Hellman computation.  ... 
doi:10.1016/s1571-0661(03)50011-1 fatcat:wfsoep62rneshlyk66wpceowzy

Trust Factor Based Key Distribution Protocol in Hybrid Cloud Environment

S. Velliangiri, R. Rajagopal, P. Karthikeyan
2019 Scalable Computing : Practice and Experience  
The existing Elliptic Curve Cryptography and Diffie Hellman key distribution mechanism failed to stress the trust factor, and further, they have provided not only higher complexity but also lower security  ...  Many protocols were developed to provide security via the cryptography technique, but these protocols rarely considered the trust factor which is an essential factor for cloud security.  ...  The performance of the Trust Factor Based Key Distribution protocol is compared with the existing ECC and Diffie Hellman key exchange technique.  ... 
doi:10.12694/scpe.v20i2.1529 fatcat:klowt3hq45b55grgbuz2ptf2fi

Secure protocol composition

Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
2003 Proceedings of the 2003 ACM workshop on Formal methods in security engineering - FMSE '03  
This paper continues the program initiated in [5] , towards a derivation system for security protocols.  ...  The present paper proposes rules for composing security protocols from given security components.  ...  In order to reason about the security property of this protocol, the term language and the protocol logic have to be enriched to allow reasoning about Diffie-Hellman computation.  ... 
doi:10.1145/1035429.1035431 dblp:conf/ccs/DattaDMP03 fatcat:dkxkiypgifgzbcooczeay7gsde

Security proofs for an efficient password-based key exchange

Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
Our analysis shows that the AuthA protocol and its multiple modes of operation are provably secure under the computational Diffie-Hellman intractability assumption, in both the random-oracle and the ideal-cipher  ...  The focus of the present paper is on the analysis of very efficient schemes that have been proposed to the IEEE P1363 Standard working group on password-based authenticated key-exchange methods, but for  ...  Acknowledgments The second author was supported by the Director, Office of Science, Office of Advanced Scientific Computing Research, Mathematical Information and Computing Sciences Division, of the U.S  ... 
doi:10.1145/948109.948142 dblp:conf/ccs/BressonCP03 fatcat:gzxg2f2subfrdlhmhderu4jd5i

A derivation system and compositional logic for security protocols

Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
2005 Journal of Computer Security  
protocol and the Diffie-Hellman key exchange protocol are established.  ...  Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie-Hellman key exchange, nonces to avoid replay, certificates from an accepted authority,  ...  Acknowledgments Partially supported by NSF CCR-0121403, Computational Logic Tools for Research and Education, the Don University Research Initiative (URL) program administered by the Office of Naval Research  ... 
doi:10.3233/jcs-2005-13304 fatcat:ie3wxbkvfvg7bf6tejoaefk4za

A syntactic approach for identifying multi-protocol attacks

Bela Genge, Piroska Haller
2009 2009 International Conference on Ultra Modern Telecommunications & Workshops  
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks.  ...  The approach is validated by analyzing several security protocol pairs. The attacks discovered by our approach are also discovered by existing security protocol verification tools.  ...  Based on this protocol model, we define a canonical model that allows a syntactical analysis of the modeled protocols by eliminating instance-based information through the use of message component types  ... 
doi:10.1109/icumt.2009.5345641 dblp:conf/icumt/GengeH09 fatcat:bemjsrsqfjbmdm6seyuk7umaha

Towards Formal Analysis of Insider Threats for Auctions

Florian Kammueller, Manfred Kerber, Christian W. Probst
2016 Proceedings of the 2016 International Workshop on Managing Insider Security Threats - MIST '16  
As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions.  ...  Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle.  ...  This publication reflects only the authors' views and the Union is not liable for any use that may be made of the information contained herein.  ... 
doi:10.1145/2995959.2995963 fatcat:xidr5xq34ncnljogzk7kn4ucie

Challenges in teaching a graduate course in applied cryptography

Sujata Garera, Jorge Vasconcelos
2009 ACM SIGCSE Bulletin  
We emphasize on the importance of such a course for a graduate student in an information security program.  ...  Rubin for encouraging us to develop such a course and for writing this paper. The website we maintained throughout the semester can be found at http://www.cs.jhu.edu/~sdoshi/crypto/crypto.html.  ...  • Generalize the 3-way Diffie Hellman protocol to an N-way protocol. • Describe semantic security proofs and proofs based on reduction.  ... 
doi:10.1145/1595453.1595485 fatcat:67pdqlvnlnc4znarpthn4g55la

An Algebra for Symbolic Diffie-Hellman Protocol Analysis [chapter]

Daniel J. Dougherty, Joshua D. Guttman
2013 Lecture Notes in Computer Science  
We study the algebra underlying symbolic protocol analysis for protocols using Diffie-Hellman operations.  ...  Using this invariant, we prove the main security goals achieved by UM, a protocol using Diffie-Hellman for implicit authentication.  ...  of protocols that use fundamental cryptographic ideas such as Diffie-Hellman key agreement [17] , henceforth, DH.  ... 
doi:10.1007/978-3-642-41157-1_11 fatcat:ctpqvnz6w5cf7leyy2ow5ke6ay

RFID-based supply chain partner authentication and key agreement

Florian Kerschbaum, Alessandro Sorniotti
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
This way we effectively remove the need for certificates issued by Trent. The Public Information Protocol is therefore no longer needed.  ...  The modified Computational Diffie-Hellman Problem (mCDH) is hard if, for all probabilistic, polynomialtime algorithms B,  ... 
doi:10.1145/1514274.1514281 dblp:conf/wisec/KerschbaumS09 fatcat:4ayuftj6frb4xkna4vdabrng74

Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys [chapter]

Mark Manulis
2009 Lecture Notes in Computer Science  
by Diffie and Hellman [21] to a group setting, e.g. [16, 20, 24, 31, 32, 37, 39, 40] .  ...  For this we use an efficient multi-recipient ElGamal encryption scheme. Further, based on PDHKE we design a generic compiler for GKE protocols that extend the classical Diffie-Hellman method.  ...  of Tree Diffie-Hellman protocols).  ... 
doi:10.1007/978-3-642-01957-9_1 fatcat:5wreasshc5gyrcp4fz7f7r5jky

Effective Signcryption Approach for Secure Convention for Multilayer Consensus using ECC

Gautam Kumar, Hemraj Saini
2016 International Journal of Security and Its Applications  
The basic operation for ISO-9798-3 based on Diffie-Hellman exponential as (CR) protocol considers, as shown in Figure 1 , that represents to show how messages are sent by one may be received by other.  ...  The basic primitives are applying on Diffie-Hellman and Elliptic Curve Cryptography.  ...  Protocol : Component composes with protocol , here is Diffie-Hellman component to get this protocol.  ... 
doi:10.14257/ijsia.2016.10.7.26 fatcat:ro53i2vnezarld3jt3mwdfip6u
« Previous Showing results 1 — 15 out of 426 results