Is it possible to decide whether a cryptographic protocol is secure or not?
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
H. Comon, Vitaly Shmatikov
semanticscholar +3 more sources
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates [PDF]
Benjamin Dowling +3 more
semanticscholar +2 more sources
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Automated formal analysis is a fundamental method for ensuring the security of cryptographic protocol design. This approach entails two stages: formal modeling and formal analysis.
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +2 more sources
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms. [PDF]
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Singh P, Pranav P, Dutta S.
europepmc +2 more sources
TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS
Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper
Ірина Стрелковська +2 more
doaj +1 more source
Verifpal: Cryptographic Protocol Analysis for the Real World
Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing ...
Nadim Kobeissi +2 more
semanticscholar +1 more source
A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський +1 more
doaj +1 more source
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
We analyze the handshake protocol of the Transport Layer Security (TLS) protocol, version 1.3. We address both the full TLS 1.3 handshake (the one round-trip time mode, with signatures for authentication and (elliptic curve) Diffie–Hellman ephemeral ((EC)
Benjamin Dowling +3 more
semanticscholar +1 more source
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj +1 more source
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko +1 more
doaj +1 more source

