We present a formal view of cryptography that overcomes the usual assumptions of formal models for reasoning about security of computer systems, i.e. perfect cryptography and Dolev-Yao adversary model. In our framework, equivalence among formal cryptographic expressions is parameterized by a computational adversary that may exploit weaknesses of the cryptosystem to cryptanalyze ciphertext with a certain probability of success. To validate our approach, we show that in the restricted setting of ideal cryptosystems, for which the probability of guessing information that the Dolev-Yao adversary cannot derive is negligible, the computational adversary is limited to the allowed behaviors of the Dolev-Yao adversary.

Troina, A., Aldini, A., Gorrieri, R. (2004). Approximating Imperfect Cryptography in a Formal Model. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 99, 183-203 [10.1016/j.entcs.2004.02.008].

Approximating Imperfect Cryptography in a Formal Model

TROINA, ANGELO;GORRIERI, ROBERTO
2004

Abstract

We present a formal view of cryptography that overcomes the usual assumptions of formal models for reasoning about security of computer systems, i.e. perfect cryptography and Dolev-Yao adversary model. In our framework, equivalence among formal cryptographic expressions is parameterized by a computational adversary that may exploit weaknesses of the cryptosystem to cryptanalyze ciphertext with a certain probability of success. To validate our approach, we show that in the restricted setting of ideal cryptosystems, for which the probability of guessing information that the Dolev-Yao adversary cannot derive is negligible, the computational adversary is limited to the allowed behaviors of the Dolev-Yao adversary.
2004
Troina, A., Aldini, A., Gorrieri, R. (2004). Approximating Imperfect Cryptography in a Formal Model. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 99, 183-203 [10.1016/j.entcs.2004.02.008].
Troina, Angelo; Aldini, Alessandro; Gorrieri, Roberto
File in questo prodotto:
Eventuali allegati, non sono esposti

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/581041
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact