Provable Cryptographic Security and its Applications to Mobile Wireless Computing

  • Authors:
  • Craig Gentry;Zulfikar Ramzan

  • Affiliations:
  • DoCoMo Communications Laboratories, Inc., San Jose, CA, U.S.A. cgentry@docomolabs-usa.com;DoCoMo Communications Laboratories, Inc., San Jose, CA, U.S.A. ramzan@docomolabs-usa.com

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many attempts to secure mobile wireless systems have failed abysmally. Notable examples include 802.11 WEP, as well as major cellular phone standards such as TDMA, CDMA, and GSM. The attacks typically result from the correct use of a bad cryptographic primitive or the incorrect use of a good one.By designing provably secure algorithms and protocols, we not only minimize the time required to gain confidence in the security of a system, but we virtually eliminate the possibility of a cryptographic vulnerability. Unfortunately, the concept of “provable securit” is often misunderstood. In this survey paper, we state precisely what provable security is and is not, and describe the benefits of the approach.