A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit <a rel="external noopener" href="http://eprint.iacr.org/2013/316.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Certified computer-aided cryptography
<span title="">2013</span>
<i title="ACM Press">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13</a>
</i>
We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended with idealised probabilistic operations in the style of code-based security proofs. The framework also incorporates an extension of the CompCert certified compiler to support trusted libraries providing
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516652">doi:10.1145/2508859.2516652</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/AlmeidaBBD13.html">dblp:conf/ccs/AlmeidaBBD13</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/34jck323kjhjvlcycoqewkyk7i">fatcat:34jck323kjhjvlcycoqewkyk7i</a>
</span>
more »
... lex arithmetic calculations or instantiating idealised components such as sampling operations. This certified compiler allows us to carry to executable code the security guarantees established at the high-level, and is also instrumented to detect when compilation may interfere with side-channel countermeasures deployed in source code. We demonstrate the applicability of the framework with the RSA-OAEP encryption scheme, as standardized in PKCS#1 v2.1. The outcome is a rigorous analysis of the advantage of an adversary to break the security of assembly implementations of the algorithms specified by the standard. The example also provides two contributions of independent interest: it is the first application of computer-aided cryptographic tools to real-world security, and the first application of CompCert to cryptographic software. 2013/5/24
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160806071243/http://eprint.iacr.org/2013/316.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/ea/10/ea10ffcf77000b329de851578fb263b8063e84e7.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508859.2516652">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
acm.org
</button>
</a>