A Realistic Environment for Crypto-Protocol Analyses by ASMs

نویسندگان

  • Giampaolo Bella
  • Elvinia Riccobene
چکیده

The ASM formalism is tailored to develop a general, realistic environment | a computer network possibly monitored by an active eavesdropper | on which any crypto-protocols can be faithfully analysed. The well known Needham-Schroeder protocol with public keys is considered as a case study, and is proven to establish secure sessions between honest agents. The eavesdropper model can reproduce Lowe's attack, and Lowe's correction to the protocol is shown to be eeective. ASM proofs are based on induction, and can be carried out without automated tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Specifying and Verifying Crypto-Protocols at the Design Level

The clear semantics of Abstract State Machines is tailored to the analysis of crypto-protocols in a realistic environment threatened by an active eavesdropper. The model is intermediate between the abstract approaches based on belief logics, and the lower level approaches based on traces of atomic actions. Properties are stated at the design level with little formal overhead, but reasoning abou...

متن کامل

A novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective

Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...

متن کامل

A novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective

Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...

متن کامل

Crypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems

In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age.  To locate the issue in a historical perspective and in line with this strand of thought, we consid...

متن کامل

Tezos: A Self-Amending Crypto-Ledger Position Paper

The popularization of Bitcoin, a decentralized crypto-currency has inspired the production of several alternative, or “alt”, currencies. Ethereum, CryptoNote, and Zerocash all represent unique contributions to the cryptocurrency space. Although most alt currencies harbor their own source of innovation, they have no means of adopting the innovations of other currencies which may succeed them. We...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998