Back to Search Start Over

The faithfulness of abstract protocol analysis: Message authentication.

Authors :
Guttman, Joshua D.
Thayer, F. Javier
Zuck, Lenore D.
Source :
Journal of Computer Security. 2004, Vol. 12 Issue 6, p865-891. 27p. 1 Diagram.
Publication Year :
2004

Abstract

Dolev and Yao initiated an approach to studying cryptographic protocols which abstracts from possible problems with the cryptography so as to focus on the structural aspects of the protocol. Recent work in this framework has developed easily applicable methods to determine many security properties of protocols. A separate line of work, initiated by Bellare and Rogaway, analyzes the way specific cryptographic primitives are used in protocols. It gives asymptotic bounds on the risk of failures of secrecy or authentication. In this paper we show how the Dolev–Yao model may be used for protocol analysis, while a further analysis gives a quantitative bound on the extent to which real cryptographic primitives may diverge from the idealized model. We illustrate this method where the cryptographic primitives are based on Carter–Wegman universal classes of hash functions. This choice allows us to give specific quantitative bounds rather than simply asymptotic bounds. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
12
Issue :
6
Database :
Academic Search Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
15344759
Full Text :
https://doi.org/10.3233/JCS-2004-12603