Back to Search
Start Over
Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library
- Source :
- International Journal of Information Security. 4:135-154
- Publication Year :
- 2005
- Publisher :
- Springer Science and Business Media LLC, 2005.
-
Abstract
- Tool-supported proofs of security protocols typically rely on abstractions from real cryptography by term algebras, so-called Dolev---Yao models. However, until recently it was not known whether a Dolev---Yao model could be implemented with real cryptography in a provably secure way under active attacks. For public-key encryption and signatures, this was recently shown, if one accepts a few additions to a typical Dolev---Yao model such as an operation that returns the length of a term. Here we extend this Dolev---Yao-style model, its realization, and the security proof to include a first symmetric primitive message authentication. This adds a major complication: we must deal with the exchange of secret keys. For symmetric authentication, we can allow this at any time, before or after the keys are first used for authentication, while working only with standard cryptographic assumptions.
- Subjects :
- Theoretical computer science
Computer Networks and Communications
Computer science
business.industry
Data_CODINGANDINFORMATIONTHEORY
Cryptographic protocol
Hash-based message authentication code
Computer security
computer.software_genre
Symmetric-key algorithm
Authentication protocol
Message authentication code
Challenge–response authentication
Safety, Risk, Reliability and Quality
Cryptographic key types
business
computer
Software
Data Authentication Algorithm
Information Systems
Subjects
Details
- ISSN :
- 16155270 and 16155262
- Volume :
- 4
- Database :
- OpenAIRE
- Journal :
- International Journal of Information Security
- Accession number :
- edsair.doi...........dd93d3cfd425b8fc18ad6d6e19f9f6e5
- Full Text :
- https://doi.org/10.1007/s10207-004-0056-6