High-Level Cryptographic Abstractions

被引:1
|
作者
Kane, Christopher [1 ]
Lin, Bo [1 ]
Chand, Saksham [1 ]
Stoller, Scott D. [1 ]
Liu, Yanhong A. [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
来源
PROCEEDINGS OF THE 14TH ACM SIGSAC WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS '19) | 2019年
关键词
cryptographic API; declarative configuration; high-level abstraction; AUTHENTICATION; ENCRYPTION; PROTOCOLS; SECURE; TOOL;
D O I
10.1145/3338504.3357343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while also allowing maximum control when needed. This paper proposes such high-level abstractions consisting of simple cryptographic primitives and full declarative configuration. These abstractions can be implemented on top of any cryptographic library in any language. We have implemented these abstractions in Python, and used them to write a wide variety of well-known security protocols, including Signal, Kerberos, and TLS. We show that programs using our abstractions are much smaller and easier to write than using low-level libraries, where size of security protocols implemented is reduced by about a third on average. We show our implementation incurs a small overhead, less than 5 microseconds for shared key operations and less than 341 microseconds (< 1%) for public key operations. We also show our abstractions are safe against main types of cryptographic misuse reported in the literature.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 50 条
  • [31] High level of inbreeding in final phase of 1000 Genomes Project
    Gazal, Steven
    Sahbatou, Mourad
    Babron, Marie-Claude
    Genin, Emmanuelle
    Leutenegger, Anne-Louise
    SCIENTIFIC REPORTS, 2015, 5
  • [32] DNA barcoding reveals a high level of mislabeling in Egyptian fish fillets
    Galal-Khallaf, Asmaa
    Ardura, Alba
    Mohammed-Geba, Khaled
    Borrell, Yaisel J.
    Garcia-Vazquez, Eva
    FOOD CONTROL, 2014, 46 : 441 - 445
  • [33] Automated generation of partial Markov chain from high level descriptions
    Brameret, P. -A.
    Rauzy, A.
    Roussel, J. -M.
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2015, 139 : 179 - 187
  • [34] Evolving Textures from High Level Descriptions: Gray with an Accent Color
    Reynolds, Craig
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, PT II, 2011, 6625 : 384 - 393
  • [35] Virtually Isolated Network: A Hybrid Network to Achieve High Level Security
    Xu, Jia
    Zhou, Jianying
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 299 - 311
  • [36] Real Time FPGA Implementation of a High Speed for Video Encryption and Decryption System with High Level Synthesis Tools
    Alhomoud, Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (01) : 724 - 731
  • [37] A high-quality chromosome-level genome of wild Rosa rugosa
    Zang, Fengqi
    Ma, Yan
    Tu, Xiaolong
    Huang, Ping
    Wu, Qichao
    Li, Zhimin
    Liu, Tao
    Lin, Furong
    Pei, Surui
    Zang, Dekui
    Zhang, Xuemei
    Zheng, Yongqi
    Yu, Yunyan
    DNA RESEARCH, 2021, 28 (05)
  • [38] Outlook of Commonly used Biometrics and Assessment of Best Trait for High Level Security
    Sultan, Shahad A.
    Ghanim, M. F.
    2020 9TH IEEE INTEGRATED STEM EDUCATION CONFERENCE (ISEC 2020), 2020,
  • [39] High Level Petri Nets Application for Reliability Visualization on Multi Echelon Supply Chain
    Esmaeeli, Hamid
    Aleahmad, Matin
    LOGISTICS AND SUPPLY CHAIN MANAGEMENT, LSCM 2020, 2021, 1458 : 43 - 52
  • [40] IVF outcome with a high level of AMH: a focus on PCOS versus non-PCOS
    Muharam, R.
    Prasetyo, Yohanes Danang
    Prabowo, Kevin Ardito
    Putri, Yuannita Ika
    Maidarti, Mila
    Hestiantoro, Andon
    BMC WOMENS HEALTH, 2022, 22 (01)