Towards Symbolic Encryption Schemes

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Standard

Towards Symbolic Encryption Schemes. / Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik.

Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Harvard

Ahmed, N, Jensen, CD & Zenner, E 2012, 'Towards Symbolic Encryption Schemes'. in Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, pp. 557-572 . Lecture Notes in Computer Science, vol. 7459, , 10.1007/978-3-642-33167-1_32

APA

Ahmed, N., Jensen, C. D., & Zenner, E. (2012). Towards Symbolic Encryption Schemes. In Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. (pp. 557-572 ). Springer. (Lecture Notes in Computer Science, Vol. 7459). 10.1007/978-3-642-33167-1_32

CBE

Ahmed N, Jensen CD, Zenner E. 2012. Towards Symbolic Encryption Schemes. In Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer. pp. 557-572 . (Lecture Notes in Computer Science, Vol. 7459). Available from: 10.1007/978-3-642-33167-1_32

MLA

Ahmed, Naveed, Christian D. Jensen and Erik Zenner "Towards Symbolic Encryption Schemes". Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer. 2012. 557-572 . (Lecture Notes in Computer Science, Volume 7459). Available: 10.1007/978-3-642-33167-1_32

Vancouver

Ahmed N, Jensen CD, Zenner E. Towards Symbolic Encryption Schemes. In Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer. 2012. p. 557-572 . (Lecture Notes in Computer Science, Vol. 7459). Available from: 10.1007/978-3-642-33167-1_32

Author

Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik / Towards Symbolic Encryption Schemes.

Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Springer, 2012. p. 557-572 (Lecture Notes in Computer Science, Vol. 7459).

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2012

Bibtex

@inbook{3bc6af8d836c4bfeae1f9d932c5a8b38,
title = "Towards Symbolic Encryption Schemes",
keywords = "Encryption, Assumptions, Implementation",
publisher = "Springer",
author = "Naveed Ahmed and Jensen, {Christian D.} and Erik Zenner",
year = "2012",
doi = "10.1007/978-3-642-33167-1_32",
isbn = "978-3-642-33166-4",
series = "Lecture Notes in Computer Science",
pages = "557-572",
booktitle = "Computer Security – ESORICS 2012",

}

RIS

TY - GEN

T1 - Towards Symbolic Encryption Schemes

A1 - Ahmed,Naveed

A1 - Jensen,Christian D.

A1 - Zenner,Erik

AU - Ahmed,Naveed

AU - Jensen,Christian D.

AU - Zenner,Erik

PB - Springer

PY - 2012

Y1 - 2012

N2 - Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes.

AB - Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes.

KW - Encryption

KW - Assumptions

KW - Implementation

U2 - 10.1007/978-3-642-33167-1_32

DO - 10.1007/978-3-642-33167-1_32

SN - 978-3-642-33166-4

BT - Computer Security – ESORICS 2012

T2 - Computer Security – ESORICS 2012

T3 - Lecture Notes in Computer Science

T3 - en_GB

SP - 557

EP - 572

ER -