earticle

논문검색

Analysis of some Famous Cryptographic Protocols Using the Interpretation-Function-based Method

초록

영어

This paper shows the efficiency and the flexibility of the interpretation function-based method [8, 9, 11] through the analysis of some famous cryptographic protocols. In fact, by using the notion of interpretation function, this method gives general and sufficient conditions allowing to guarantee the secrecy property of cryptographic protocols. This result holds under a large class of equational theories, that makes the approach flexible and general. Moreover, the approach does not only help to prove the secrecy property, but also helps a lot to discover protocols weaknesses and to correct them. These advantages are discussed and illustrated by cases study of some protocols that are analyzed in different equational theories.

목차

Abstract
 1. Introduction
 2. Basic definitions
 3. Secrecy property
 4. Main result
 5. Guideline to Define a Safe Interpretation Function
  5.1. Restrictions on the Selection Function S
  5.2. Restrictions on the Function I
  5.3. Simple and Practical Steps to Construct F
  5.4. Example 1: The DEK Function
  5.5. Example 2: The DEKAN Function
 6. Analysis of Cryptographic Protocols under Different Equational Theories
  6.1. Who and Lam Protocol
  6.2. Shamir Three Pass Protocol and Commutativity of Encryption
  6.3. Bull Protocol and ⊕ Properties
  6.4. Needham-Schroeder Lowe Protocol and Homomorphism
 7. Conclusion
 References

저자정보

  • Hanane Houmani LSFM Research Group, Computer Science Department, Laval University, Quebec, Canada
  • Mohamed Mejri LSFM Research Group, Computer Science Department, Laval University, Quebec, Canada

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.