On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol

作者: Michael Backes , Birgit Pfitzmann

DOI: 10.1007/0-387-33406-8_20

关键词:

摘要: Symbolic secrecy of exchanged keys is arguably one the most important notions shown with automated proof tools. It means that an adversary restricted to symbolic operations on terms can never get entire key into its knowledge set. Cryptographic essentially computational indistinguishability between real and a random one, given view much more general adversary.

参考文章(32)
Michael Waidner, Birgit Pfitzmann, Michael Backes, A Composable Cryptographic Library with Nested Operations (Extended Abstract) ,(2003)
Daniele Micciancio, Bogdan Warinschi, Soundness of Formal Encryption in the Presence of Active Adversaries theory of cryptography conference. pp. 133- 151 ,(2004) , 10.1007/978-3-540-24638-1_8
Peeter Laud, Semantics and Program Analysis of Computationally Secure Information Flow european symposium on programming. pp. 77- 91 ,(2001) , 10.1007/3-540-45309-1_6
Véronique Cortier, Bogdan Warinschi, Computationally Sound, Automated Proofs for Security Protocols Programming Languages and Systems. ,vol. 3444, pp. 157- 171 ,(2005) , 10.1007/978-3-540-31987-0_12
Virgil D. Gligor, Pompiliu Donescu, Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes fast software encryption. pp. 92- 108 ,(2001) , 10.1007/3-540-45473-X_8
Michael Backes, Birgit Pfitzmann, Michael Waidner, Symmetric Authentication Within a Simulatable Cryptographic Library european symposium on research in computer security. pp. 271- 290 ,(2003) , 10.1007/978-3-540-39650-5_16
Mihir Bellare, Chanathip Namprempre, Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm international conference on the theory and application of cryptology and information security. pp. 531- 545 ,(2000) , 10.1007/3-540-44448-3_41
Lawrence C. Paulson, Relations between secrets: two formal analyses of the Yahalom protocol Journal of Computer Security. ,vol. 9, pp. 197- 216 ,(2001) , 10.3233/JCS-2001-9302
Michael Backes, A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol Computer Security – ESORICS 2004. pp. 89- 108 ,(2004) , 10.1007/978-3-540-30108-0_6
B. Pfitzmann, M. Backes, Symmetric encryption in a simulatable Dolev-Yao style cryptographic library ieee computer security foundations symposium. pp. 204- 218 ,(2004) , 10.1109/CSFW.2004.20