Confidentiality and Integrity: A Constructive Perspective
نویسندگان
چکیده
Traditional security definitions in the context of secure communication specify properties of cryptographic schemes. For symmetric encryption schemes, these properties are intended to capture the protection of the confidentiality or the integrity of the encrypted messages. A vast variety of such definitions has emerged in the literature and, despite the efforts of previous work, the relations and interplay of many of these notions (which are a priori not composable) are unexplored. Also, the exact guarantees implied by the properties are hard to understand. In constructive cryptography, notions such as confidentiality and integrity appear as attributes of channels, i.e., the communication itself. This makes the guarantees achieved by cryptographic schemes explicit, and leads to security definitions that are composable. In this work, we follow the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions. In particular, we compare these definitions with related constructive notions and find that some are too weak, such as INT-PTXT, or artificially strong, such as INT-CTXT. Others appear unsuitable for symmetric encryption, such as IND-CCA.
منابع مشابه
The Secure Electronic Transfer of Prescriptions
This paper describes the information security attributes of confidentiality, integrity and availability, and then uses these to determine the security requirements for ETP. It briefly describes the four published UK ETP models (from Flexiscript, Phamacy2U, Salford and Transcript) and evaluates these from the perspectives of confidentiality, integrity and availability. Deficiencies, from a secur...
متن کاملConstructive Methods for the Generation of Prime Numbers
Public-key cryptography is rapidly becoming ubiquitous in many aspects of “electronic” life. It is used to provide various security services such as data integrity, confidentiality, authentication and nonrepudiation. Most public-key cryptographic methods require the generation of random prime numbers. A naive solution to obtain a prime number consists in randomly choosing a number and testing i...
متن کاملSecurity and Privacy Enhancing in Multi-Cloud Architecture with Data De-Duplication
Cloud computing makes IT more efficient and cost effective in today’s world. Cloud computing act as a virtual server that the user can access via internet on a needed basis and this eliminates the need for the companies to host their own servers and purchase of expensive software. On the other hand there arise many new types of cyber theft. The main concerns in cloud computing are data integrit...
متن کاملSecurity Risk Analysis of RFID Technology
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the i...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012