A survey of algebraic properties used in cryptographic protocols

  • Authors:
  • Véronique Cortier;Stéphanie Delaune;Pascal Lafourcade

  • Affiliations:
  • LORIA, CNRS UMR 7503 and INRIA Lorraine project CASSIS, Campus Scientifique -- BP 239, 54506 Vandoeuvre-les-Nancy cedex, France E-mail: cortier@loria.fr;France Télécom R&D, France and Lab. Spéécification et Vérification, ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, 94235 Cachan cedex, France, E-mail: ...;Lab. Spéc. et Vérif., ENS de Cachan and CNRS UMR 8643 and INRIA Futurs project SECSI, 61, 94235 Cachan cedex, E-mail: lafourca@lsv.ens-cachan.fr and LIF, Université Aix-Marseille 1 ...

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that an adversary cannot learn anything from an encrypted message except if he has the key. Such an assumption is too strong in general since some attacks exploit in a clever way the interaction between protocol rules and properties of cryptographic operators. Moreover, the executability of some protocols relies explicitly on some algebraic properties of cryptographic primitives such as commutative encryption. We give a list of some relevant algebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.