HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

A Formal Theory of Key Conjuring.

Véronique Cortier 1 Stéphanie Delaune 1 Graham Steel 2
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM's Common Cryptographic Architecture (CCA).
Document type :
Conference papers
Complete list of metadata

Contributor : Véronique Cortier Connect in order to contact the contributor
Submitted on : Wednesday, October 24, 2007 - 10:40:02 AM
Last modification on : Friday, January 21, 2022 - 3:09:05 AM


  • HAL Id : inria-00181612, version 1


Véronique Cortier, Stéphanie Delaune, Graham Steel. A Formal Theory of Key Conjuring.. 20th IEEE Computer Security Foundations Symposium - CSF'07, Jul 2007, Venice, Italy. pp.79-96. ⟨inria-00181612⟩



Record views