470,078 Hits in 4.6 sec

On the Secure Implementation of Security Protocols [chapter]

Pablo Giambiagi, Mads Dam
2003 Lecture Notes in Computer Science  
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized.  ...  Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services.  ...  Introduction We consider the problem of securely implementing a security protocol given an API providing standard services for cryptography, communication, key-and buffer management.  ... 
doi:10.1007/3-540-36575-3_11 fatcat:d67nwevogrgbbltcjwawkhexaa

On the secure implementation of security protocols

Pablo Giambiagi, Mads Dam
2004 Science of Computer Programming  
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized.  ...  Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services.  ...  Introduction We consider the problem of securely implementing a security protocol given an API providing standard services for cryptography, communication, key-and buffer management.  ... 
doi:10.1016/j.scico.2004.01.002 fatcat:yr4m7apnh5ccnmc33l2txcmwtm

On the implementation of a deterministic secure coding protocol using polarization entangled photons

Martin Ostermeyer, Nino Walenta
2008 Optics Communications  
In the course of our implementation we analyze the practicability of the protocol and discuss some security aspects of information transfer in such a deterministic scheme.  ...  Due to the deterministic nature of this protocol the need for post-processing the key is distinctly reduced compared to non-deterministic protocols.  ...  To prove security for the modified variant of the protocol within our implementation would be beyond the scope of this paper and remains to be given in the future.  ... 
doi:10.1016/j.optcom.2008.04.068 fatcat:62fhsmzknna5hmipgr4xy5p7ya

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Fusheng Wu, Huanguo Zhang, Wengqing Wang, Jianwei Jia, Shi Yuan
2017 Security and Communication Networks  
The security analysis of protocols on theory level cannot guarantee the security of protocol implementations.  ...  , etc.) and dynamically analyze the security of protocol implementations.  ...  Acknowledgments This work was supported in part by the National Natural Science Key Foundation of China (no. 61332019) and the National Basic Research Program (NBRP) (973 Program) (no. 2014CB340601),  ... 
doi:10.1155/2017/7042835 fatcat:w5iybmz2njdgrcy2dupvjwzfqq

On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol

Minoru Kuribayashi
2010 EURASIP Journal on Information Security  
In this paper, we propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme.  ...  In the conventional schemes, the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed.  ...  Acknowledgment This research was partially supported by the Ministry of Education, Culture, Sports Science and Technology, Grantin-Aid for Young Scientists (B) (21760291), 2009.  ... 
doi:10.1155/2010/694797 fatcat:jaucipgsgjcprixfh3hy7l6ai4

On-the-fly Model Checking of Security Protocols and Its Implementation by Maude

Guoqiang Li, Mizuhito Ogawa
2007 IPSJ Digital Courier  
We implement the on-the-fly model checking method using Maude, and automatically detect the flaws of several security protocols, such as the NSPK protocol and the Woo-Lam protocol, etc..  ...  The number of traces will be infinite due to (1) infinitely many sessions of a protocol, (2) infinitely many principals in the network, and (3) infinitely many messages that intruders can generate.  ...  Acknowledgments We thank Bochao Liu and Xin Li for fruitful discussions on the research, Jianwen Xiang for his skilled Maude technique and Shin Nakajima for the information of related references.  ... 
doi:10.2197/ipsjdc.3.343 fatcat:baqzknjehzeo5nltx3jvmzwq3q

A model-based approach to security flaw detection of network protocol implementations

Yating Hsu, Guoqiang Shu, David Lee
2008 Network Protocols (ICNP), Proceedings of the IEEE International Conference on  
A lot of efforts have been devoted to the analysis of network protocol specification for reliability and security properties using formal techniques.  ...  However, faults can also be introduced during system implementation; it is indispensable to detect protocol implementation flaws, yet due to the black-box nature of protocol implementation and the unavailability  ...  However, the prevalent security testing for protocol implementation faults is rather limited due to the following two major hurdles: • Black-box Implementation The black-box nature of protocol implementation  ... 
doi:10.1109/icnp.2008.4697030 dblp:conf/icnp/HsuSL08 fatcat:6m3jraa355f7zmbwmswnezbudm

On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan

Qiang Tang
2007 2007 Second International Conference on Communications and Networking in China  
In this paper we investigate the security properties of three versions of the WAI protocol in Chinese WLAN implementation plan.  ...  We further analyse the third version of the WAI protocol and prove its security in the Canetti-Krawczyk model. In addition, we also provide some practical security analysis of this version.  ...  We have the following theorem on the security of the protocol. Proof. It is straightforward to verify that the protocol satisfies the first requirement of Definition 1.  ... 
doi:10.1109/chinacom.2007.4469395 fatcat:sxorllqxgjalrfx55754oua2sm

An IDE for the Design, Verification and Implementation of Security Protocols

Remi Garcia, Paolo Modesti
2017 2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)  
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone.  ...  This Eclipse-based IDE leverages on existing languages and tools for the modelling and verification of security protocols, such as the AnBx Compiler and Code Generator, the model checker OFMC and the cryptographic  ...  ACKNOWLEDGEMENT Rémi Garcia was supported by the EU Erasmus Programme during his visit at the University of Sunderland.  ... 
doi:10.1109/issrew.2017.69 dblp:conf/issre/GarciaM17 fatcat:ng6ocrzmsrbjza33ibwajhwz5a

Analysis of Data Transmission Protocols to Implement Secure Automated Systems on the Example of "Smart Home"

Alexander V. Nasteka, Catherine E. Bessonova
2015 Vestnik policii  
The result of the research is recommendation on the use of wireless protocols.  ...  This article describes the modern data transfer protocol for implementing secure data transfer. The author describes interconnection with private security firms.  ...  ., Candid W, Insecurity in the Internet of Things // SECURITY RESPONSE. 2015. pp. 9-14. 6. Michael S., Ulf L., 7 Smart-Home-Starter-Kits imSicherheits-Test // AV-TEST-Studie. 2014. pp. 16-41. 7.  ... 
doi:10.13187/vesp.2015.5.106 fatcat:jst2gacrbvb5hl4rd7irg4ooxi

Computational verification of C protocol implementations by symbolic execution

Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Our first step uses symbolic execution to extract a process calculus model from a C implementation of the protocol.  ...  We implement our method and apply it to verify several protocols out of reach of previous work in the symbolic model (using ProVerif), either due to the use of XOR and Diffie-Hellman commitments, or due  ...  François Dupressoir commented on a draft. Anupam Datta provided statistics on the codebase analysed by ASPIER. The work is supported by the Microsoft Research PhD Scholarship.  ... 
doi:10.1145/2382196.2382271 dblp:conf/ccs/AizatulinGJ12 fatcat:epmzv6u5kbbuvenpwblpvzutw4

Verified implementations of the information card federated identity-management protocol

Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
Our code can interoperate with existing implementations of the roles of the protocol (client, identity provider, and relying party).  ...  Hence, we obtain the most substantial examples of verified implementations of cryptographic protocols to date, and the first for any federated identitymanagement protocols.  ...  Acknowledgments We thank Martín Abadi and Arun Nanda for detailed discussions on drafts of this paper.  ... 
doi:10.1145/1368310.1368330 dblp:conf/ccs/BhargavanFGS08 fatcat:w2yjfaxzhzamjhtgeqb4nqaclu

Preservation of epistemic properties in security protocol implementations

Ron van der Meyden, Thomas Wilke
2007 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge - TARK '07  
In our logic we can express fundamental security properties of these protocols. The proof of the main theorem is based on a notion of refinement for probabilistic Kripke structures.  ...  is implemented using an encryption scheme that guarantees perfect secrecy (in the sense of Shannon).  ...  In other words, all the security properties of an "ideal" protocol are preserved under implementations using information-theoretically secure encryption.  ... 
doi:10.1145/1324249.1324278 dblp:conf/tark/MeydenW07 fatcat:mi2ucnnqmbbcdlrh7ovfsnzwa4

Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets

Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer
2011 Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11  
In this paper we present the design and implementation of these protocols on different platforms and extensively study their performance.  ...  Furthermore, we present details on the implementation of a privacy-preserving iPhone application built on top of this library.  ...  Acknowledgment In part, this work was supported by NSF Award CCF 1018616 and the UMIC Research Center, RWTH Aachen.  ... 
doi:10.1145/1943513.1943529 dblp:conf/codaspy/MayerTWM11 fatcat:cxdik5gg2jfi7ofqs4j5ofawqa

A Proposal Analytical Model and Simulation of the Attacks in Routing Protocols of MANETs : Implementation of a Secure Model of Mobility

Karim KONATE, Abdourahime GAYE
2017 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
We conducted a simulation of the attacks with a C implementation of the proposed mathematical models.  ...  The model used to simulate the malicious nodes mobility attacks is based on graphical theory, which is a tool for analyzing the behavior of nodes.  ...  BACKGROUND An attack is an action which aims at compromising the security of the network.  ... 
doi:10.5121/jgraphoc.2017.9201 fatcat:fczvgqzfxnh57gcjbpfyu3ajne
« Previous Showing results 1 — 15 out of 470,078 results