Separating the Specification and Implementation Phases in Cryptology

作者: Marie-Jeanne Toussaint

DOI: 10.1007/BFB0013893

关键词:

摘要: We propose to separate the specification and implementation phases in conception of cryptographic protocols. The phase describes logic protocol. develop a method for formally verifying this before publication contains choice an appropriate function.

参考文章(15)
E. F. Brickell, P. J. Lee, Y. Yacobi, Secure Audio Teleconference international cryptology conference. pp. 418- 426 ,(1987) , 10.1007/3-540-48184-2_36
Marie-Jeanne Toussaint, Deriving the Complete Knowledge of Participants in Cryptographic Protocols (Extended Abstract) international cryptology conference. pp. 24- 43 ,(1991)
Marie-Jeanne Toussaint, Deriving the Complete Knowledge of Participants in Cryptographic Protocols international cryptology conference. pp. 24- 43 ,(1991) , 10.1007/3-540-46766-1_2
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Shafi Goldwasser, Silvio Micali, Charles Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing. ,vol. 18, pp. 186- 208 ,(1989) , 10.1137/0218012
Collin I'Anson, Chris Mitchell, Security defects in CCITT recommendation X.509 ACM SIGCOMM Computer Communication Review. ,vol. 20, pp. 30- 34 ,(1990) , 10.1145/378570.378623
R.A. Kemmerer, Analyzing encryption protocols using formal verification techniques IEEE Journal on Selected Areas in Communications. ,vol. 7, pp. 448- 457 ,(1989) , 10.1109/49.17707
L. Gong, R. Needham, R. Yahalom, Reasoning about belief in cryptographic protocols ieee symposium on security and privacy. pp. 234- 248 ,(1990) , 10.1109/RISP.1990.63854
P. Syverson, The use of logic in the analysis of cryptographic protocols ieee symposium on security and privacy. pp. 156- 170 ,(1991) , 10.1109/RISP.1991.130784