Projects per year
Abstract
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM's common cryptographic architecture (CCA).
Original language | English |
---|---|
Title of host publication | Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 79-96 |
Number of pages | 18 |
ISBN (Print) | 0-7695-2819-8 |
DOIs | |
Publication status | Published - 2007 |
Fingerprint
Dive into the research topics of 'A Formal Theory of Key Conjuring'. Together they form a unique fingerprint.Projects
- 1 Finished