KIT | KIT-Bibliothek | Impressum | Datenschutz

Towards Applying Cryptographic Security Models to Real-World Systems

Rill, Jochen

Abstract (englisch):
The cryptographic methodology of formal security analysis usually works in three steps:
choosing a security model, describing a system and its intended security properties, and creating a formal proof of security.
For basic cryptographic primitives and simple protocols this is a well understood process and is performed regularly.
For more complex systems, as they are in use in real-world settings it is rarely applied, however.
In practice, this often leads to missing or incomplete descriptions of the security properties and requirements of such systems, which in turn can lead to insecure implementations and consequent security breaches.
One of the main reasons for the lack of application of formal models in practice is that they are particularly difficult to use and to adapt to new use cases.

With this work, we therefore aim to investigate how cryptographic security models can be used to argue about the security of real-world systems.
To this end, we perform case studies of three important types of real-world systems: data outsourcing, computer networks and electronic payment.

First, we give a unified framework to express and analyze the security of data outsourcing schemes.
... mehr

Open Access Logo


Volltext §
DOI: 10.5445/IR/1000118648
Veröffentlicht am 27.04.2020
Cover der Publikation
Zugehörige Institution(en) am KIT Institut für Theoretische Informatik (ITI)
Publikationstyp Hochschulschrift
Publikationsdatum 27.04.2020
Sprache Englisch
Identifikator KITopen-ID: 1000118648
Verlag Karlsruhe
Umfang XII, 127 S.
Abschlussart Dissertation
Fakultät Fakultät für Informatik (INFORMATIK)
Institut Institut für Theoretische Informatik (ITI)
Prüfungsdatum 21.04.2020
Referent/Betreuer Prof. J. Müller-Quade
KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft
KITopen Landing Page