172 research outputs found

    A Formal Theory of Key Conjuring

    Get PDF
    Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM’s Common Cryptographic Architecture (CCA)

    Automating Security Analysis: Symbolic Equivalence of Constraint Systems

    Get PDF
    We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence

    Emerg. Infect. Dis

    Get PDF
    The multidrug-resistant (MDR) Salmonella enterica serotype Newport strain that produces CMY-2 β-lactamase(Newport MDR-AmpC) was the source of sporadic cases and outbreaks in humans in France during 2000–2005. Because this strain was not detected in food animals, it was most likely introduced into France through imported food products

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols

    Privacy Architectures: Reasoning About Data Minimisation and Integrity

    Get PDF
    Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task. We propose an approach based on the specification of privacy architectures and focus on a key aspect of privacy, data minimisation, and its tension with integrity requirements. We illustrate our formal framework through a smart metering case study.Comment: appears in STM - 10th International Workshop on Security and Trust Management 8743 (2014

    Identification of new transitions and mass assignments of levels in 143−153^{143-153}Pr

    Full text link
    The previously reported levels assigned to 151,152,153Pr have recently been called into question regarding their mass assignment. The above questioned level assignments are clarified by measuring g-transitions tagged with A and Z in an in-beam experiment in addition to the measurements from 252Cf spontaneous fission (SF) and establish new spectroscopic information from N=84N=84 to N=94N=94 in the Pr isotopic chain. The isotopic chain 143-153Pr has been studied from the spontaneous fission of 252Cf by using Gammasphere and also from the measurement of the prompt g-rays in coincidence with isotopically-identified fission fragments using VAMOS++ and EXOGAM at GANIL. The latter were produced using 238U beams on a 9Be target at energies around the Coulomb barrier. The g-g-g-g data from 252Cf (SF) and those from the GANIL in-beam A- and Z-gated spectra were combined to unambiguously assign the various transitions and levels in 151,152,153Pr and other isotopes. New transitions and bands in 145,147,148,149,150Pr were identified by using g-g-g and g-g-g-g coincidences and A and Z gated g-g spectra. The transitions and levels previously assigned to 151,153Pr have been confirmed by the (A,Z) gated spectra. The transitions previously assigned to 152Pr are now assigned to 151Pr on the basis of the (A,Z) gated spectra. Two new bands with 20 new transitions in 152Pr and one new band with 7 new transitions in 153Pr are identified from the g-g-g-g coincidence spectra and the (A,Z) gated spectrum. In addition, new g-rays are also reported in 143-146Pr. New levels of 145,147-153Pr have been established, reliable mass assignments of the levels in 151,152,153Pr have been reported and new transitions have been identified in 143-146Pr showing the new avenues that are opened by combining the two experimental approaches.Comment: Accepted in Phys. Rev.

    The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols

    Get PDF
    International audiencePrivacy-preserving security properties in cryptographic protocols are typically modelled by observational equivalences in process calculi such as the applied pi-calulus. We survey decidability and complexity results for the automated verification of such equivalences, casting existing results in a common framework which allows for a precise comparison. This unified view, beyond providing a clearer insight on the current state of the art, allowed us to identify some variations in the statements of the decision problems-sometimes resulting in different complexity results. Additionally, we prove a couple of novel or strengthened results
    • …
    corecore