Provable security and fairness in cryptographic identification and signature schemes / Sécurité prouvée et équité dans les schémas cryptographiques d'identification et de signature

نویسنده

  • Julien Cathalo
چکیده

Identification schemes are public-key cryptographic primitives that allow an entity (called the prover) to prove his or her identity to another entity. An identification scheme is secure if no attacker can impersonate the prover. Digital signature schemes allow an entity to produce a signature on a message; given the message and the signature, another entity can check the identity of the signer and verify that the message was not modified. A secure digital signature scheme is such that an attacker can not produce a forgery, i.e. a false signature. There has been a lot of work aiming at establishing, in a provable manner, the security of such schemes. Given a cryptographic scheme and a security property, one should be able to demonstrate whether the scheme satisfies it or not. The approach is usually the following: when the security property is not satisfied, show it with an efficient attack; when it is satisfied, use a security proof. But even when they are provably secure, cryptographic schemes can be attacked: it can be at the implementation level, or because of a flaw in the proof. The goal of this thesis is to apply these approaches to study the security of several public-key cryptographic schemes. We study the GPS identification scheme and show how some implementations can be broken by an efficient attack. We show how to securely sign long messages with RSA. We break a fair exchange signature scheme based on GPS and RSA. We consider a new problem called fair identification and propose a fair identification scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constraints-based Verification of Parameterized Cryptographic Protocols

Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...

متن کامل

Computationally Sound, Automated Proofs for Security Protocols

Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographi...

متن کامل

Théories de l'intrus pour la vérification des protocoles cryptographiques. (Intruder theories for the verification of cryptographic protocols)

Je remercie aussi les différentes personnes qui ont soutenu (et soutiennent encore !) la vie du campus de l'École, parfois au détriment de leur scolarité, en s'investissant dans les associations et les clubs animant les soirées et les weekends : (par ordre alphabétique, j'espère ne pas avoir oublié trop de monde ou du moins, de ne pas avoir oublié de personnes ran-m'ont permis d'apprécier les a...

متن کامل

Un modèle de rôles multi-politiques d'accès pour la coopération en sécurité de systèmes d'information

RÉSUMÉ. Ce travail de recherche s'inscrit dans le domaine de la sécurité des accès dans les systèmes d'information coopérant. La modélisation proposée doit prendre en compte l'interopération de systèmes d'information ouverts et évolutifs et, de plus, garantir le respect des différentes politiques de sécurité locales. La coexistence de sources d’information hétérogènes dans le cadre d’un système...

متن کامل

On the Reachability Problem in Cryptographic Protocols

We study the veri cation of secrecy and authenticity properties for cryptographic protocols which rely on symmetric shared keys. The veri cation can be reduced to check whether a certain parallel program which models the protocol and the speci cation can reach an erroneous state while interacting with the environment. Assuming nite principals, we present a simple decision procedure for the reac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007