A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

被引:43
作者
Cortier, Veronique [1 ,2 ]
Kremer, Steve [3 ,4 ,5 ]
Warinschi, Bogdan [6 ]
机构
[1] CNRS, Nancy, France
[2] INRIA Project Cassis, Nancy, France
[3] CNRS, LSV, Cachan, France
[4] ENS Cachan, Cachan, France
[5] INRIA Project SECSI, Cachan, France
[6] Univ Bristol, Dept Comp Sci, Bristol, Avon, England
关键词
Symbolic methods; Computational analysis; Cryptography; Security protocol; SOUND SECURITY PROOF; FORMAL ENCRYPTION; SYMMETRIC-ENCRYPTION; BRSIM/UC-SOUNDNESS; IMPLEMENTATIONS; SEMANTICS; SECRECY; MODEL;
D O I
10.1007/s10817-010-9187-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers with respect to the more detailed computational models have been quite unclear. For more than 20 years the two approaches have coexisted but evolved mostly independently. Recently, significant research efforts attempt to develop paradigms for cryptographic systems analysis that combines the best of both worlds. There are two broad directions that have been followed. Computational soundness aims to establish sufficient conditions under which results obtained using symbolic models imply security under computational models. The direct approach aims to apply the principles and the techniques developed in the context of symbolic models directly to computational ones. In this paper we survey existing results along both of these directions. Our goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist.
引用
收藏
页码:225 / 259
页数:35
相关论文
共 104 条
[1]  
Abadi M, 2005, LECT NOTES COMPUT SC, V3580, P664
[2]   Reconciling two views of cryptography (The computational soundness of formal encryption) [J].
Abadi, M ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :103-127
[3]  
ABADI M, 2006, LNCS, V3921
[4]  
Abadi M., 2000, LECT NOTES COMPUTER, V1872, P3
[5]  
ABADI M, 2005, P 24 ACM S PRINC DAT, P108
[6]  
Abadi M, 2006, LECT NOTES COMPUT SC, V4279, P253
[7]   Security analysis of cryptographically controlled access to XML documents [J].
Abadi, Martin ;
Warinschi, Bogdan .
JOURNAL OF THE ACM, 2008, 55 (02)
[8]  
Abadi Martin, 1997, P 4 ACM C COMP COMM, P36, DOI [10.1145/266420.266432, DOI 10.1145/266420.266432]
[9]  
Adao P, 2005, LECT NOTES COMPUT SC, V3679, P374
[10]   Computational and information-theoretic soundness and completeness of formal encryption [J].
Adao, P ;
Bana, G ;
Scedrov, A .
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, :170-184