Trusted multiplexing of cryptographic protocols

  • Authors:
  • Jay McCarthy;Shriram Krishnamurthi

  • Affiliations:
  • Brigham Young University;Brown University

  • Venue:
  • FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this analysis on common protocol formulations. We discuss the gap between the merely possible and the pragmatic through an optimization that informs a multiplexer. We also address the security ramifications of trusting external parties for this task and evaluate our work on a large repository of cryptographic protocols. We have verified this work using the Coq proof assistant.