International Association for Cryptologic Research

International Association
for Cryptologic Research


Paper: Ceremony Design and Analysis

Carl Ellison
Search ePrint
Search Google
Abstract: The concept of ceremony is introduced as an extension of the concept of network protocol, with human nodes alongside computer nodes and with communication links that include UI, human-to-human communication and transfers of physical objects that carry data. What is out-of-band to a protocol is in-band to a ceremony, and therefore subject to design and analysis using variants of the same mature techniques used for the design and analysis of protocols. Ceremonies include all protocols, as well as all applications with a user interface, all workflow and all provisioning scenarios. A secure ceremony is secure against both normal attacks and social engineering. However, some secure protocols imply ceremonies that cannot be made secure.
  title={Ceremony Design and Analysis},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / implementation, key management, social engineering, human-computer interface},
  note={(none) 13803 received 14 Oct 2007, last revised 17 Oct 2007},
  author={Carl Ellison},