2011
DOI: 10.1007/978-3-642-23082-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Verification by Typing for a Sample Protocol Implementation

Abstract: International audienceType systems are effective tools for verifying the security of cryptographic protocols and implementations. They provide automation, modularity and scalability, and have been applied to large protocols. In this tutorial, we illustrate the use of types for verifying authenticity properties, first using a symbolic model of cryptography, then relying on a concrete computational assumption.(1) We introduce refinement types (that is, types carrying formulas to record invariants) for programs w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…A more detailed discussion of further related work (including [32,33,49]) can be found in [4]; for recent surveys of related work in higher-level languages, see [29] and [38].…”
Section: Related Workmentioning
confidence: 99%
“…A more detailed discussion of further related work (including [32,33,49]) can be found in [4]; for recent surveys of related work in higher-level languages, see [29] and [38].…”
Section: Related Workmentioning
confidence: 99%
“…The protocol description language is inspired by the security protocol notation introduced for Kerberos [21]. Ultimately, we hope to be able to apply our approach over a network, and particularly to reason about secure communication in the type system [10,11].…”
Section: Related Workmentioning
confidence: 99%
“…For simplicity we only consider the single key setting. Fournet et al [30] show how to verify a variant of the protocol with multiple keys shared between pairs of principals using our MAC functionality; the details are available online. Security is modelled as safety when running with an active adversary that calls the functions client and server (to trigger parallel sessions) and controls the network.…”
Section: Lemma 1 (Typing) I C ⊢ F ❀ Imentioning
confidence: 99%