Formal models for security protocols often rely on assumptions not to be found in computational models. A first assumption is the perfect encryption one: encrypted data can not be manipulated in any way unless the decryption key is known. Another usual assumption is the free algebra one: only a few cryptographic primitives are considered in the model, and these must form a free algebra. We study these assumptions, and relax them to define more general models. We then define static analysis techniques for veryfing protocols secure in our models.

Models for Cryptographic Protocol Analysis

2006

Abstract

Formal models for security protocols often rely on assumptions not to be found in computational models. A first assumption is the perfect encryption one: encrypted data can not be manipulated in any way unless the decryption key is known. Another usual assumption is the free algebra one: only a few cryptographic primitives are considered in the model, and these must form a free algebra. We study these assumptions, and relax them to define more general models. We then define static analysis techniques for veryfing protocols secure in our models.
24-giu-2006
Italiano
Degano, Pierpaolo
Università degli Studi di Pisa
File in questo prodotto:
File Dimensione Formato  
phdZunino.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 766.45 kB
Formato Adobe PDF
766.45 kB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/152392
Il codice NBN di questa tesi è URN:NBN:IT:UNIPI-152392