A Formal Theory of Key Conjuring

V. Cortier, Stéphanie Delaune, G. Steel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM's common cryptographic architecture (CCA).
Original languageEnglish
Title of host publicationComputer Security Foundations Symposium, 2007. CSF '07. 20th IEEE
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages79-96
Number of pages18
ISBN (Print)0-7695-2819-8
DOIs
Publication statusPublished - 2007

Fingerprint

Dive into the research topics of 'A Formal Theory of Key Conjuring'. Together they form a unique fingerprint.

Cite this