Provable Security in the Real World

被引:21
作者
Degabriele, Jean Paul [1 ]
Paterson, Kenneth G. [1 ]
Watson, Gaven J. [2 ]
机构
[1] Univ London, London WC1E 7HU, England
[2] Univ Calgary, Calgary, AB T2N 1N4, Canada
基金
英国工程与自然科学研究理事会;
关键词
Encryption; Games; Protocols; Semantics; Public key; secure protocols; Provable security; ENCRYPTION; ATTACKS; SSH;
D O I
10.1109/MSP.2010.200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provable security is sometimes portrayed as having revolutionized cryptography, transforming it from an art into a science. Three decades after its inception, is this transition complete? Are cryptanalysts out of business? If so, why do we still hear about attacks against real-world cryptographic systems? © 2011 IEEE.
引用
收藏
页码:33 / 41
页数:9
相关论文
共 15 条
[1]   Plaintext Recovery Attacks Against SSH [J].
Albrecht, Martin R. ;
Paterson, Kenneth G. ;
Watson, Gaven J. .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :16-26
[2]  
Bellare M., 2004, ACM Transactions on Information and Systems Security, V7, P206, DOI 10.1145/996943.996945
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[4]  
Canvel B, 2003, LECT NOTES COMPUT SC, V2729, P583
[5]  
DAI W, 2002, ATTACK SSH2 PROTOCOL
[6]   On the (In)Security of IPsec in MAC-then-Encrypt Configurations [J].
Degabriele, Jean Paul ;
Paterson, Kenneth G. .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :493-504
[7]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[8]   Another look at "provable security" [J].
Koblitz, Neal ;
Menezes, Alfred J. .
JOURNAL OF CRYPTOLOGY, 2007, 20 (01) :3-37
[9]  
KOHNO T, 2004, ACM C COMP COMM SEC, P72
[10]  
Krawczyk Hugo., 2001, Advances in Cryptology-CRYPTO, V2139, P310