Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516663
|View full text |Cite
|
Sign up to set email alerts
|

Fully automated analysis of padding-based encryption in the computational model

Abstract: International audienceComputer-aided verification provides effective means of analyzing the security of cryptographic primitives. However, it has remained a challenge to achieve fully automated analyses yielding guarantees that hold against computational (rather than symbolic) attacks. This paper meets this challenge for public-key encryption schemes built from trapdoor permutations and hash functions. Using a novel combination of techniques from computational and symbolic cryptography, we present proof system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
37
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(38 citation statements)
references
References 30 publications
1
37
0
Order By: Relevance
“…But smaller padding-based schemes were also found by the tool. Similar schemes have also been reported in [2]. Fig.…”
Section: Synthesis Of Padding-based Encryption Schemessupporting
confidence: 79%
See 2 more Smart Citations
“…But smaller padding-based schemes were also found by the tool. Similar schemes have also been reported in [2]. Fig.…”
Section: Synthesis Of Padding-based Encryption Schemessupporting
confidence: 79%
“…We first provide an example from public key cryptography inspired by the work in [2] that consist on synthesizing padding schemes. Our second example is related to symmetric key encryption, and builds upon the work presented in [13].…”
Section: Cryptographic Constructionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast to computer-aided tools for verifying cryptographic proofs, which have existed for some time, computer-aided tools for synthesizing new constructions are very recent. Barthe et al [11] develop an automated tool, called ZooCrypt, for synthesizing padding-based encryption schemes; their tool uses a dedicated logic with an efficient proof search procedure to prove chosen-plaintext or chosen-ciphertext security, and an efficient method for finding attacks on insecure schemes. Because the search space for reasonably-sized constructions is small (about 10 6 well-typed schemes), simple trimming techniques are sufficient to cover the full search space efficiently.…”
Section: Other Related Workmentioning
confidence: 99%
“…In this work, multiple possible algorithms are generated out of a library of components and then checked for security. This may involve the use of Dolev-Yao like tools to weed out insecure algorithms or even verify the security of correct ones, as in [Barthe et al, 2013].…”
Section: Security Propertiesmentioning
confidence: 99%