Passer à la navigation principale Passer à la recherche Passer au contenu principal

Symbolic methods in computational cryptography proofs

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

Code-based game-playing is a popular methodology for proving security of cryptographic constructions and side-channel countermeasures. This methodology relies on treating cryptographic proofs as an instance of relational program verification (between probabilistic programs), and decomposing the latter into a series of elementary relational program verification steps. In this paper, we develop principled methods for proving such elementary steps for probabilistic programs that operate over finite fields and related algebraic structures. We focus on three essential properties: program equivalence, information flow, and uniformity. We give characterizations of these properties based on deducibility and other notions from symbolic cryptography. We use (sometimes improve) tools from symbolic cryptography to obtain decision procedures or sound proof methods for program equivalence, information flow, and uniformity. Finally, we evaluate our approach using examples drawn from provable security and from side-channel analysis-for the latter, we focus on the masking countermeasure against differential power analysis. A partial implementation of our approach is integrated in EasyCrypt, a proof assistant for provable security, and in MaskVerif, a fully automated prover for masked implementations.

langue originaleAnglais
titreProceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019
EditeurIEEE Computer Society
Pages136-151
Nombre de pages16
ISBN (Electronique)9781728114064
Les DOIs
étatPublié - 1 juin 2019
Evénement32nd IEEE Computer Security Foundations Symposium, CSF 2019 - Hoboken, États-Unis
Durée: 25 juin 201928 juin 2019

Série de publications

NomProceedings - IEEE Computer Security Foundations Symposium
Volume2019-June
ISSN (imprimé)1940-1434

Une conférence

Une conférence32nd IEEE Computer Security Foundations Symposium, CSF 2019
Pays/TerritoireÉtats-Unis
La villeHoboken
période25/06/1928/06/19

Empreinte digitale

Examiner les sujets de recherche de « Symbolic methods in computational cryptography proofs ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation