Filters








997 Hits in 5.1 sec

Authenticated Diffe-Hellman Key Agreement Protocols [chapter]

Simon Blake-Wilson, Alfred Menezes
1999 Lecture Notes in Computer Science  
The practical and provable security aspects of these protocols are discussed.  ...  This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem.  ...  (Exact security is a concrete quantification of the security guaranteed by a protocol in terms of the perceived security of the underlying cryptographic primitives, e.g., the Diffie-Hellman problem or  ... 
doi:10.1007/3-540-48892-8_26 fatcat:akczicmnxfbn5p6qvsirvnfune

Secure Cloud Storage Service with an Efficient DOKS Protocol

ZhengTao Jiang, Ling Liu
2013 2013 IEEE International Conference on Services Computing  
provably strong privacy for both users and cloud storage service providers.  ...  Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics.  ...  This work is partially sponsored by grants from NSF NetSE program, SaTC program, IBM faculty award and Intel ISTC on Cloud Computing.  ... 
doi:10.1109/scc.2013.37 dblp:conf/IEEEscc/JiangL13 fatcat:bsrwwpbq5rdtjjapydgy4c2rpy

How to Evaluate the Security of Real-Life Cryptographic Protocols? [chapter]

Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David Basin
2010 Lecture Notes in Computer Science  
Governments and international standards bodies have established certification procedures for security-critical technologies, such as cryptographic algorithms.  ...  Such standards have not yet been established for cryptographic protocols and hence it is difficult for users of these protocols to know whether they are trustworthy.  ...  These tools have become increasingly mature in recent years and can now provide a fine-grained analysis of the security of cryptographic protocols, which is lacking in less-principled engineering methods  ... 
doi:10.1007/978-3-642-14992-4_16 fatcat:tywbtwtxmndxzi4mbomwryprvu

Cryptographic protocol logic: Satisfaction for (timed) Dolev–Yao cryptography

Simon Kramer
2008 The Journal of Logic and Algebraic Programming  
Namely, the security of communication (as opposed to security of storage) and cryptographic protocols (as opposed to cryptographic operators). The logical concepts explored are the following.  ...  Cryptographic Protocol Logic).  ...  Acknowledgements I would like to thank Sergei Artëmov, Mika Cohen, Ralf Küsters, and Lawrence Moss for their valuable criticism.  ... 
doi:10.1016/j.jlap.2008.05.005 fatcat:pt4btsr36je7ddyjt6q3m6pzrm

A protocol for property-based attestation

Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble
2006 Proceedings of the first ACM workshop on Scalable trusted computing - STC '06  
We prove the security of this protocol under the strong RSA assumption and the discrete logarithm assumption in the random oracle model.  ...  However, as pointed out recently, the binary attestation has some shortcomings, in particular when used for applications: First, it reveals information about the configuration of a platform (hardware and  ...  We propose a provably secure protocol for property-based attestation that concretely implements the delegation-based solution sketched above.  ... 
doi:10.1145/1179474.1179479 dblp:conf/ccs/ChenLLRSS06 fatcat:eahxthe3qfb77kbrhhnjddmyzy

Towards computationally sound symbolic analysis of key exchange protocols

Prateek Gupta, Vitaly Shmatikov
2005 Proceedings of the 2005 ACM workshop on Formal methods in security engineering - FMSE '05  
We present a cryptographically sound formal method for proving correctness of key exchange protocols. Our main tool is a fragment of a symbolic protocol logic.  ...  We illustrate our method by constructing a proof of security for a simple authenticated Diffie-Hellman protocol.  ...  Design and analysis of provably correct key exchange protocols has a long history [8, 22, 7, 9, 6, 34, 15, 16] .  ... 
doi:10.1145/1103576.1103580 dblp:conf/ccs/GuptaS05 fatcat:52xu4y4fkbfpfprwenwon3vaia

Privacy-preserving wildcards pattern matching protocol for IoT applications

Hong Qin, Hao Wang, Xiaochao Wei, Likun Xue, Lei Wu
2019 IEEE Access  
In addition, our protocol also supports query with wildcards which can be used for the batch search. This protocol is provable-secure against honest-but-curious adversaries.  ...  There are a lot of studies on privacy-preserving pattern matching protocols, but most protocols are constructed using heavy public-key cryptographic operations, which are not applicable to IoT devices.  ...  His primary interest includes public key cryptography, in particular, designing cryptographic primitives and provable security.  ... 
doi:10.1109/access.2019.2900519 fatcat:gylkehwmpjgyvbawes3odz4gci

Formal verification of security protocol implementations: a survey

Matteo Avalle, Alfredo Pironti, Riccardo Sisto
2012 Formal Aspects of Computing  
The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approach.  ...  Automated formal verification of security protocols has been mostly focused on analyzing highlevel abstract models which, however, are significantly different from real protocol implementations written  ...  models and analysis of different security properties.  ... 
doi:10.1007/s00165-012-0269-9 fatcat:z7bgh5nnuzh4leo7wgf5rwd5ci

Establishing and fixing a freshness flaw in a key-distribution and Authentication Protocol

Reiner Dojen, Ioana Lasc, Tom Coffey
2008 2008 4th International Conference on Intelligent Computer Communication and Processing  
Cryptographic protocols are used to provide security services such as confidentiality, message integrity, authentication, certified E-mail and non-repudiation.  ...  The security of electronic networks and information systems is nowadays seen as a critical issue for the growth of Information and Communication Technologies.  ...  Cryptographic security protocols are widely used for the secure delivery of data over mobile and fixed networks.  ... 
doi:10.1109/iccp.2008.4648371 fatcat:mywdwionanhixc55yohbl3baau

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks [article]

Jaydip Sen
2013 arXiv   pre-print
Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sensor data obtained from dispersed sensor nodes, these networks must be secured to prevent any possible  ...  Wireless sensor networks have emerged as an important and new area in wireless and mobile computing research because of their numerous potential applications that range from indoor deployment scenarios  ...  Kumar Nayak of National Institute of Science and Technology (NIST), Odisha, India.  ... 
arXiv:1308.0682v1 fatcat:zkwd6kpgkjaojhxkupzpggo67e

A secure and lightweight scheme for media keying in the session initiation protocol (SIP)

Vijay K. Gurbani, Vladimir Kolesnikov
2010 Principles, Systems and Applications of IP Telecommunications on - IPTComm '10  
We first briefly survey the two IETF SIP media keying protocols -SDES and DTLS-SRTP -and evaluate them against a core feature set.  ...  At the same time, it provides significantly better security than SDES and is only slightly weaker than the non-PKI version of DTLS-SRTP.  ...  Such adversaries are standard in cryptographic design and analysis of key exchange protocols [5, 20, 12, 13] .  ... 
doi:10.1145/1941530.1941535 dblp:conf/iptcomm/GurbaniK10 fatcat:wndq6y5pavez5c42dwmgxll7ou

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols [article]

Horace P. Yuen
2014 arXiv   pre-print
It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs.  ...  Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere.  ...  ACKNOWLEDGMENT The work reported in this article was supported by the Air Force Office of Scientific Research and the Defense Advanced Research Project Agency.  ... 
arXiv:1405.1683v1 fatcat:k6n4weseq5grngfhyapyjumwbq

Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool

Anca D. Jurcut, Tom Coffey, Reiner Dojen
2013 Journal of Communications  
 Abstract-Formal verification aims at providing a rigid and thorough means of evaluating the correctness of security protocols and also establishing that the protocols are free of weaknesses that can  ...  The verification tool with attack detection capabilities is introduced, and the verification process is demonstrated by way of a case study on two published security protocols that provide mutual authentication  ...  The design of provably correct security protocols is complex and highly prone to error.  ... 
doi:10.12720/jcm.8.11.795-805 fatcat:cok5aynveff2ffiuv3256sivom

A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)

Saeed Ullah Jan, Irshad Ahmed Abbasi, Fahad Algarni
2022 Computers Materials & Continua  
The proposed protocol's security analysis section has been conducted formally using BAN (Burrows-Abadi-Needham) logic, ProVerif2.03 simulation, and informally using discussion/pragmatic illustration.  ...  Upon comparing the proposed protocol with prior works, it has been demonstrated that it is efficient and effective and recommended for practical implementation in the IoD environment.  ...  Acknowledgement: The authors would like to express their sincere thanks to the University of Bisha, Bisha, Saudi Arabia, for the support provided during the research.  ... 
doi:10.32604/cmc.2022.026179 fatcat:jdgoq64wwvb7zdjimeol3g5qrm

A Privacy-Preserving, Mutual PUF-Based Authentication Protocol

Wenjie Che, Mitchell Martin, Goutham Pocklassery, Venkata Kajuluri, Fareena Saqib, Jim Plusquellic
2016 Cryptography  
This enables the development of an efficient authentication protocol that provides both privacy and mutual authentication.  ...  The security properties of the protocol are analyzed using data collected from a set of Xilinx Zynq FPGAs.  ...  of the strong PUF and (4) resilience to protocol attacks.  ... 
doi:10.3390/cryptography1010003 fatcat:4wnut7kpbffkzizimcru6pcqci
« Previous Showing results 1 — 15 out of 997 results