2001
DOI: 10.1007/3-540-44810-1_17
|View full text |Cite
|
Sign up to set email alerts
|

The Correctness of Crypto Transaction Sets

Abstract: This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I'm going to discuss is, what's the next problem to tackle once we've done crypto protocols? We keep on saying that crypto-protocols appear to be "done" and then some new application comes along to give us more targets to work on -multi-media, escrow, you name it. But sooner or later, it seems reasonable to assume, crypto will be done. What's the next thing to do?The argument I'm going to make is that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…Intention represents the true and idealised aims of a designer when producing an API, which may be updated retrospectively. We define intention in the same way as it is used in Anderson's definition of an API attack [1], as "a malicious sequence of commands which result in an output the designer could not possibly have intended". A security policy document may be explicit or implicit, it may be wrong, it may have gaps.…”
Section: Securing Inputs To Security Apismentioning
confidence: 99%
See 1 more Smart Citation
“…Intention represents the true and idealised aims of a designer when producing an API, which may be updated retrospectively. We define intention in the same way as it is used in Anderson's definition of an API attack [1], as "a malicious sequence of commands which result in an output the designer could not possibly have intended". A security policy document may be explicit or implicit, it may be wrong, it may have gaps.…”
Section: Securing Inputs To Security Apismentioning
confidence: 99%
“…With respect to key role, the API treats real world-people as resources, and decides whether or not a key (through assuming a particular role) should be granted access to a user. This reversal of perspective is of much more practical than focusing on roles of people, as the divisions there tend to be more straightforward 1 .…”
Section: Rolementioning
confidence: 99%
“…The attacks on PKCS#11 we consider in this paper are at the API level [2,4,5,6,10,11,13,21], i.e., the attacker is assumed to control the host on which the token is connected and to perform any sequence of (legal) API calls. The crucial functionalities of PKCS#11 are the ones for exporting and importing sensitive keys (CKA SENSITIVE), called C WrapKey and C UnwrapKey.…”
Section: Introductionmentioning
confidence: 99%
“…We have shown, however, that this is not always the case for commercial devices [6] (see, in particular, attack a4). 2 Our starting point is to allow variations in how the standard is implemented, in particular for what concerns assigning attributes to keys, and devise techniques to prove that these implementations achieve the desired security goals. Our approach is 'language-based' which makes it appealing for application to the firmware of real devices, as we discuss in Section 5.…”
Section: Introductionmentioning
confidence: 99%
“…The attacks on PKCS#11 we consider in this paper are at the API level [1,2,3,4,7,8,10,16], i.e., the attacker is assumed to control the host on which the token is connected and to perform any sequence of (legal) API calls. The crucial functionalities of PKCS#11 are the ones for exporting and importing sensitive keys, called C WrapKey and C UnwrapKey.…”
Section: Introductionmentioning
confidence: 99%