Conference paper ยท Book chapter
Towards Symbolic Encryption Schemes
Department of Informatics and Mathematical Modeling, Technical University of Denmark1
Embedded Systems Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark2
Computer Science and Engineering, Department of Informatics and Mathematical Modeling, Technical University of Denmark3
Offenburg University of Applied Sciences4
Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm, namely an authenticated encryption scheme that is secure under chosen ciphertext attack.
Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes.
Language: | English |
---|---|
Publisher: | Springer |
Year: | 2012 |
Pages: | 557-572 |
Proceedings: | 17th European Symposium on Research in Computer Security (ESORICS 2012)European Symposium on Research in Computer Security |
Series: | Lecture Notes in Computer Science |
Journal subtitle: | 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings |
ISBN: | 3642331661 , 364233167X , 364233167x , 9783642331664 and 9783642331671 |
ISSN: | 03029743 and 16113349 |
Types: | Conference paper and Book chapter |
DOI: | 10.1007/978-3-642-33167-1_32 |
ORCIDs: | Jensen, Christian D. |