Back to Search
Start Over
The faithfulness of abstract protocol analysis: Message authentication.
- Source :
-
Journal of Computer Security . 2004, Vol. 12 Issue 6, p865-891. 27p. 1 Diagram. - Publication Year :
- 2004
-
Abstract
- Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts from possible problems with the cryptography so as to focus on the structural aspects of the protocol. Recent work in this framework has developed easily applicable methods to determine many security properties of protocols. A separate line of work, initiated by Bellare and Rogaway, analyzes the way specific cryptographic primitives are used in protocols. It gives asymptotic bounds on the risk of failures of secrecy or authentication. In this paper we show how the Dolev–Yao model may be used for protocol analysis, while a further analysis gives a quantitative bound on the extent to which real cryptographic primitives may diverge from the idealized model. We illustrate this method where the cryptographic primitives are based on Carter–Wegman universal classes of hash functions. This choice allows us to give specific quantitative bounds rather than simply asymptotic bounds. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 0926227X
- Volume :
- 12
- Issue :
- 6
- Database :
- Academic Search Index
- Journal :
- Journal of Computer Security
- Publication Type :
- Academic Journal
- Accession number :
- 15344759
- Full Text :
- https://doi.org/10.3233/JCS-2004-12603