首页> 外文会议>9th ACM workshop on digital rights management 2009 >Computational soundness for key exchange protocols with symmetric encryption
【24h】

Computational soundness for key exchange protocols with symmetric encryption

机译:具有对称加密的密钥交换协议的计算安全性

获取原文
获取原文并翻译 | 示例

摘要

Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated tools. An important question is whether this kind of formal analysis implies security guarantees in the strong sense of modern cryptography. Initiated by the seminal work of Abadi and Rogaway, this question has been investigated and numerous positive results showing this so-called computational soundness of formal analysis have been obtained. However, for the case of active adversaries and protocols that use symmetric encryption computational soundness has remained a challenge.
机译:基于符号模型的安全协议的形式分析在发现已发布协议中的缺陷并使用自动化工具证明协议安全方面非常成功。一个重要的问题是,这种形式化分析是否暗含了现代密码学意义上的安全性保证。由阿巴迪(Abadi)和罗加威(Rogaway)的开创性工作发起,对此问题进行了调查,并获得了许多积极的结果,这些结果表明形式分析的这种所谓的计算合理性。但是,对于使用对称加密的主动对手和协议而言,计算的可靠性仍然是一个挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号