Sangam: A Confluence of Knowledge Streams

On symbolic analysis of cryptographic protocols

Show simple item record

dc.contributor Ronald L. Rivest and Ran Canetti.
dc.contributor Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.
dc.contributor Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.
dc.creator Patil, Akshay (Akshay R.)
dc.date 2006-07-13T15:15:55Z
dc.date 2006-07-13T15:15:55Z
dc.date 2005
dc.date 2005
dc.date.accessioned 2022-05-04T06:12:27Z
dc.date.available 2022-05-04T06:12:27Z
dc.identifier http://hdl.handle.net/1721.1/33331
dc.identifier 62326058
dc.identifier.uri http://localhost:8080/xmlui/handle/CUHPOERS/2007
dc.description Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
dc.description Includes bibliographical references (p. 91-94).
dc.description The universally composable symbolic analysis (UCSA) framework layers Dolev-Yao style symbolic analysis on top of the universally composable (UC) secure framework to construct computationally sound proofs of cryptographic protocol security. The original proposal of the UCSA framework by Canetti and Herzog (2004) focused on protocols that only use public key encryption to achieve 2-party mutual authentication or key exchange. This thesis expands the framework to include protocols that use digital signatures as well. In the process of expanding the framework, we identify a flaw in the framework's use of UC ideal functionality FKE. We also identify issues that arise when combining FKE with the current formulation of ideal signature functionality FSI,. Motivated by these discoveries, we redefine the FPKE and FsIG functionalities appropriately.
dc.description by Akshay Patil.
dc.description M.Eng.
dc.format 94 p.
dc.format 4556148 bytes
dc.format 4560019 bytes
dc.format application/pdf
dc.format application/pdf
dc.format application/pdf
dc.language eng
dc.publisher Massachusetts Institute of Technology
dc.rights M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.
dc.rights http://dspace.mit.edu/handle/1721.1/7582
dc.subject Electrical Engineering and Computer Science.
dc.title On symbolic analysis of cryptographic protocols
dc.type Thesis


Files in this item

Files Size Format View
62326058-MIT.pdf 4.560Mb application/pdf View/Open

This item appears in the following Collection(s)

  • DSpace@MIT [2699]
    DSpace@MIT is a digital repository for MIT's research, including peer-reviewed articles, technical reports, working papers, theses, and more.

Show simple item record

Search DSpace


Advanced Search

Browse