High-Level Cryptographic Abstractions

被引:1
|
作者
Kane, Christopher [1 ]
Lin, Bo [1 ]
Chand, Saksham [1 ]
Stoller, Scott D. [1 ]
Liu, Yanhong A. [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
来源
PROCEEDINGS OF THE 14TH ACM SIGSAC WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS '19) | 2019年
关键词
cryptographic API; declarative configuration; high-level abstraction; AUTHENTICATION; ENCRYPTION; PROTOCOLS; SECURE; TOOL;
D O I
10.1145/3338504.3357343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while also allowing maximum control when needed. This paper proposes such high-level abstractions consisting of simple cryptographic primitives and full declarative configuration. These abstractions can be implemented on top of any cryptographic library in any language. We have implemented these abstractions in Python, and used them to write a wide variety of well-known security protocols, including Signal, Kerberos, and TLS. We show that programs using our abstractions are much smaller and easier to write than using low-level libraries, where size of security protocols implemented is reduced by about a third on average. We show our implementation incurs a small overhead, less than 5 microseconds for shared key operations and less than 341 microseconds (< 1%) for public key operations. We also show our abstractions are safe against main types of cryptographic misuse reported in the literature.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 50 条
  • [1] A High-level Abstraction Layer for Cloud Computing
    Binh Minh Nguyen
    Viet Tran
    Hluchy, Ladislav
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 446 - 449
  • [2] Chaos and high-level dynamics in coupled lasers and their applications
    Donati, Silvano
    Hwang, Sheng-Kwang
    PROGRESS IN QUANTUM ELECTRONICS, 2012, 36 (2-3) : 293 - 341
  • [3] High-Level Production of Hydroxytyrosol in Engineered Saccharomyces cerevisiae
    Liu, Huayi
    Wu, Xinxin
    Ma, He
    Li, Jian
    Liu, Zhenyu
    Guo, Xufan
    Dong, Jia
    Zou, Shaolan
    Luo, Yunzi
    ACS SYNTHETIC BIOLOGY, 2022, 11 (11): : 3706 - 3713
  • [4] A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability
    Ma Zhaofeng
    Huang Jianqing
    Jiang Ming
    Niu Xinxin
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (03) : 481 - 494
  • [5] ProFET: Feature engineering captures high-level protein functions
    Ofer, Dan
    Linial, Michal
    BIOINFORMATICS, 2015, 31 (21) : 3429 - 3436
  • [6] Proposed Model to Implement High-Level Information Security in Internet of Things
    Castilho, Sergio Duque
    Godoy, Eduardo P.
    Castilho, Tayane W. L.
    Salmen, Fadir
    2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2017, : 165 - 170
  • [7] Formal verification of complex business processes based on high-level Petri nets
    Kheldoun, Ahmed
    Barkaoui, Kamel
    Ioualalen, Malika
    INFORMATION SCIENCES, 2017, 385 : 39 - 54
  • [8] ReShape: Towards a High-Level Approach to Design and Operation of Modular Reconfigurable Systems
    Neely, Christopher E.
    Brebner, Gordon
    Shang, Weijia
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2013, 6 (01)
  • [9] Peer Review in CS2: Conceptual Learning and High-Level Thinking
    Turner, Scott Alexander
    Perez-Quinones, Manuel A.
    Edwards, Stephen H.
    ACM TRANSACTIONS ON COMPUTING EDUCATION, 2018, 18 (03):
  • [10] Access/CPN 2.0: A High-Level Interface to Coloured Petri Net Models
    Westergaard, Michael
    APPLICATIONS AND THEORY OF PETRI NETS, 2011, 6709 : 328 - 337