Publication | Closed Access
On message integrity in cryptographic protocols
85
Citations
9
References
2003
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityVerificationCryptographic TechnologyCryptographic ProtocolFormal VerificationMessage Integrity RequirementsNetwork ProtocolsSecurity ProtocolsProtocolsSecure ProtocolNetworked Computer SystemsMessage IntegrityComputer ScienceOperational ModelCybersecurity ProtocolsData SecurityCryptographyCryptographic ProtectionFormal Methods
An operational model for message integrity in cryptographic protocols is presented, message integrity requirements are discussed, and message structures that satisfy those requirements are suggested. A message splicing/decomposition invariant of the cipher block chaining (CBC) mode of encryption is derived and used to identify heretofore-unknown vulnerabilities of well-known protocols. The suggested message structures remove these vulnerabilities relying only on the use of weak one-way functions.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1