CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms
@inproceedings{Chichester2022CryptoSolveTA, title={CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms}, author={Dalton Chichester and Wei Du and Raymond Kauffman and Hai Lin and Christopher Lynch and Andrew M. Marshall and Catherine A. Meadows and Paliath Narendran and Veena Ravishankar and Luis Rovira and Brandon Rozek}, booktitle={International Symposium on Games, Automata, Logics and Formal Verification}, year={2022} }
Recently, interest has been emerging in the application of symbolic techniques to the specification and analysis of cryptosystems. These techniques, when accompanied by suitable proofs of sound-ness/completeness, can be used both to identify insecure cryptosystems and prove sound ones secure. But although a number of such symbolic algorithms have been developed and implemented, they re-main scattered throughout the literature. In this paper, we present a tool, CryptoSolve, which provides a…
21 References
Fully automated analysis of padding-based encryption in the computational model
- Computer Science, MathematicsCCS
- 2013
This paper presents proof systems for analyzing the chosen-plaintext and chosen-ciphertext security of public-key encryption schemes built from trapdoor permutations and hash functions in the random oracle model, and develops a toolset that bundles together fully automated proof and attack finding algorithms.
Linicrypt: A Model for Practical Cryptography
- Computer Science, MathematicsCRYPTO
- 2016
It is shown that indistinguishability of Linicrypt programs can be expressed as an existential formula, making the model amenable to automated program synthesis, and it is possible to use a SAT/SMT solver to automatically generate Linirypt programs satisfying a given security constraint.
A Complete Characterization of Security for Linicrypt Block Cipher Modes
- Computer Science, Mathematics2022 IEEE 35th Computer Security Foundations Symposium (CSF)
- 2022
It is proved that a Linicrypt block cipher mode is secure if and only if it is secure against adversaries who choose all-zeroes plaintexts, and is easy to check for a candidate mode.
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
- Computer Science, Mathematics2014 IEEE 27th Computer Security Foundations Symposium
- 2014
This work proposes an automated approach for the security analysis of block-cipher modes of operation based on a "local" analysis of the steps carried out by the mode when handling a single message block, and introduces a set of labels and constraints on the edges, and proves a meta-theorem showing that any mode for which there exists a labeling of the edges satisfying these constraints is secure.
Symbolic and Computational Reasoning About Cryptographic Modes of Operation
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
In this paper we develop symbolic and computational representations for a class of cryptographic modes of operation, where the symbolic representations are modeled as elements of a term algebra, and…
Tweakable Block Ciphers
- Computer Science, MathematicsJournal of Cryptology
- 2010
This work formalizes a cryptographic primitive, the “tweakable block cipher,” and suggests that tweakable block ciphers are easy to design, the extra cost of making a block cipher “Tweakable” is small, and it is easier to design and prove the security of applications of blockciphers that need this variability using tweakable blocks.
Computationally sound implementations of equational theories against passive adversaries
- Computer Science, MathematicsInf. Comput.
- 2005
Automated Analysis and Synthesis of Authenticated Encryption Schemes
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015
This work presents an automated approach for analyzing and synthesizing blockcipher-based AE schemes, significantly extending prior work by Malozemoff et al. (CSF 2014) who synthesize encryption schemes satisfying confidentiality only.
OCB: a block-cipher mode of operation for efficient authenticated encryption
- Computer Science, MathematicsCCS '01
- 2001
It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2020
This work systematize the methods to a linear approach to analyzing generic security of ABE, which is not only useful in analyzing existing schemes, but can also be applied during the design and reviewing of new schemes.