Verification of cryptographic protocols: techniques and link to cryptanalysis - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

Verification of cryptographic protocols: techniques and link to cryptanalysis

Résumé

Security protocols are short programs aiming at securing communications over a network. They are widely used in our everyday life. Their verification using symbolic models has shown its interest for detecting attacks and proving security properties. In particular, several automatic tools have been developed. However, the guarantees that the symbolic approach offers have been quite unclear compared to the computational approach that considers issues of complexity and probability. This later approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. In this talk, we present several techniques used for symbolically verifying security protocols and we show that it is possible to obtain the best of both worlds: fully automated proofs and strong, clear security guarantees. For example, for the case of protocols that use signatures and asymmetric encryption, we establish that symbolic integrity and secrecy proofs are sound with respect to the computational model against an active adversary.
Fichier principal
Vignette du fichier
cortier.pdf (30.64 Ko) Télécharger le fichier

Dates et versions

inria-00091656 , version 1 (06-09-2006)

Identifiants

  • HAL Id : inria-00091656 , version 1

Citer

Véronique Cortier. Verification of cryptographic protocols: techniques and link to cryptanalysis. Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France. ⟨inria-00091656⟩
89 Consultations
38 Téléchargements

Partager

Gmail Facebook X LinkedIn More