Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

A Survey of Algebraic Properties Used in Cryptographic Protocols

Identifieur interne : 006056 ( Main/Exploration ); précédent : 006055; suivant : 006057

A Survey of Algebraic Properties Used in Cryptographic Protocols

Auteurs : Véronique Cortier ; Stéphanie Delaune ; Pascal Lafourcade

Source :

RBID : CRIN:cortier05c

English descriptors

Abstract

Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" wicri:score="149">A Survey of Algebraic Properties Used in Cryptographic Protocols</title>
</titleStmt>
<publicationStmt>
<idno type="RBID">CRIN:cortier05c</idno>
<date when="2005" year="2005">2005</date>
<idno type="wicri:Area/Crin/Corpus">004289</idno>
<idno type="wicri:Area/Crin/Curation">004289</idno>
<idno type="wicri:explorRef" wicri:stream="Crin" wicri:step="Curation">004289</idno>
<idno type="wicri:Area/Crin/Checkpoint">000504</idno>
<idno type="wicri:explorRef" wicri:stream="Crin" wicri:step="Checkpoint">000504</idno>
<idno type="wicri:Area/Main/Merge">006279</idno>
<idno type="wicri:Area/Main/Curation">006056</idno>
<idno type="wicri:Area/Main/Exploration">006056</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en">A Survey of Algebraic Properties Used in Cryptographic Protocols</title>
<author>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
</author>
<author>
<name sortKey="Delaune, Stephanie" sort="Delaune, Stephanie" uniqKey="Delaune S" first="Stéphanie" last="Delaune">Stéphanie Delaune</name>
</author>
<author>
<name sortKey="Lafourcade, Pascal" sort="Lafourcade, Pascal" uniqKey="Lafourcade P" first="Pascal" last="Lafourcade">Pascal Lafourcade</name>
</author>
</analytic>
<series>
<title level="j">Journal of Computer Security</title>
<imprint>
<date when="2005" type="published">2005</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>abelian group</term>
<term>algebraic properties</term>
<term>cryptographic protocols</term>
<term>decidability results</term>
<term>elliptic curves</term>
<term>exclusive or</term>
<term>modular exponentiation</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en" wicri:score="2108">Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.</div>
</front>
</TEI>
<affiliations>
<list></list>
<tree>
<noCountry>
<name sortKey="Cortier, Veronique" sort="Cortier, Veronique" uniqKey="Cortier V" first="Véronique" last="Cortier">Véronique Cortier</name>
<name sortKey="Delaune, Stephanie" sort="Delaune, Stephanie" uniqKey="Delaune S" first="Stéphanie" last="Delaune">Stéphanie Delaune</name>
<name sortKey="Lafourcade, Pascal" sort="Lafourcade, Pascal" uniqKey="Lafourcade P" first="Pascal" last="Lafourcade">Pascal Lafourcade</name>
</noCountry>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 006056 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 006056 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     CRIN:cortier05c
   |texte=   A Survey of Algebraic Properties Used in Cryptographic Protocols
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022