Questions tagged [protocol-analysis]

Protocol analysis is the detailed analysis of the security of an abstract or concrete cryptographic protocol.

Protocol analysis is the detailed analysis of the security of an abstract or concrete cryptographic protocol.

194 questions
5
votes
0 answers

Logics for Cryptographic Information Games

Preamble: There is currently a zoo of various logics for evaluating (proving) security in cryptographic protocols. The idea is that, by expressing these protocols using some logic, you can create a formula describing some property (such as shared…
mdxn
  • 159
  • 5
3
votes
0 answers

Security of a 3-party key exchange protocol

I am trying to find attacks on a theoretical protocol or prove its security. An initiator wants to establish a shared key with a responder with help of a trusted server. We have the following roles: $I$: Initiator, $R$: Responder, $S$: Server. There…
Format..
3
votes
1 answer

How do I construct and use the Okamoto protocol simulator?

Proof Okamoto protocol has zero knowledge if we constructing a suitable simulator I found the following schema of Okamoto: But I don't really understand —how can I construct such a simulator and create proofs?
Tina Ch
  • 115
  • 2
1
vote
0 answers

What is Difference between Managed Object and Object Type in KMIP?

I currently study and develop the KMIP. I test the sample(Part of sample message encode(Beispiel Nachricht Enkodierung)) with opensource, KMIP4J. I think Symmetric Key(Object Type) in sample is Managed Object. and I also think Managed Object shall…
신동평
  • 75
  • 4
0
votes
2 answers

Formal modeling and automated verification of a remote attestation protocol

I'm involved in the design of a communication protocol that requires mutual remote attestation of both communicating parties prior to exchanging any other data. We found several tools for symbolic security analysis of cryptographic protocols such as…
iures
  • 1
  • 1
0
votes
1 answer

How robust is my coded output?

I create codes and ciphers and as a hobby and I was wondering if there was any outfit that would 'test' your output to see how resilient it is. Is there a group anywhere that will accept code, try to break it, and report back to you with results? Or…
Clarence
  • 1
  • 1
0
votes
1 answer

Fairness in cryptography

Two users A and B decided to share a file of same size and transfer data bit by bit. And at the end of exchange, A will have B's data and B will have A's data. Assuming, A starts to transfer the first bit, is the protocol considered fair? If both…
user23
  • 75
  • 3
  • 8
0
votes
0 answers

Proof of reputation on a subject

I'm mulling over the need for a proof of reputation performed on a subject. When a guy starts to build a future he has to start here from scratch, his previous reputation does not matter, but it is not true, there is a lot of value in his…