International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Security proofs of cryptographic protocols

Authors:
Eva Jencusova
Download:
URL: http://eprint.iacr.org/2002/015
Search ePrint
Search Google
Abstract: In time of internet attacks is important to use cryptographic protcols and algorithms to secure private data that are sent via Internet. But using of such protocol is not enough. To really secure our data we must know that used protocol is secure. For this purpose where a lot of methods design such as well-known BAN logic. In this articel we want to present DLA (Database and Logic Abduction)- method that is used to prove that a security or cryptographic protocol is secure or it is possible perform an attack.
BibTeX
@misc{eprint-2002-11539,
  title={Security proofs of cryptographic protocols},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / security,cryptographic protocols,IPsec,IKE,Needham-Schroeder protocol,proofs of cryptographic protocols,verifying of of cryptographic protocols,Datalog,Abduction},
  url={http://eprint.iacr.org/2002/015},
  note={ jencusova@yahoo.com 11722 received 4 Feb 2002},
  author={Eva Jencusova},
  year=2002
}