Towards Symbolic Encryption Schemes

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Documents

DOI

View graph of relations

Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes.
Original languageEnglish
TitleComputer Security – ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
PublisherSpringer
Publication date2012
Pages557-572
ISBN (print)978-3-642-33166-4
ISBN (electronic)978-3-642-33167-1
DOIs
StatePublished

Conference

Conference17th European Symposium on Research in Computer Security (ESORICS 2012)
CountryItaly
CityPisa
Period10/09/1214/09/12
Internet addresshttp://www.iit.cnr.it/esorics2012/
NameLecture Notes in Computer Science
Volume7459
ISSN (Print)0302-9743
CitationsWeb of Science® Times Cited: No match on DOI

Keywords

  • Encryption, Assumptions, Implementation
Download as:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word

Download statistics

No data available

ID: 41011663