Towards Symbolic Encryption Schemes

Naveed Ahmed, Christian D. Jensen, Erik Zenner

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    378 Downloads (Pure)

    Abstract

    Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes.
    Original languageEnglish
    Title of host publicationComputer Security – ESORICS 2012 : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
    PublisherSpringer
    Publication date2012
    Pages557-572
    ISBN (Print)978-3-642-33166-4
    ISBN (Electronic)978-3-642-33167-1
    DOIs
    Publication statusPublished - 2012
    Event17th European Symposium on Research in Computer Security (ESORICS 2012) - Pisa, Italy
    Duration: 10 Sep 201214 Sep 2012
    http://www.iit.cnr.it/esorics2012/

    Conference

    Conference17th European Symposium on Research in Computer Security (ESORICS 2012)
    Country/TerritoryItaly
    CityPisa
    Period10/09/201214/09/2012
    Internet address
    SeriesLecture Notes in Computer Science
    Volume7459
    ISSN0302-9743

    Keywords

    • Encryption
    • Assumptions
    • Implementation

    Fingerprint

    Dive into the research topics of 'Towards Symbolic Encryption Schemes'. Together they form a unique fingerprint.

    Cite this