Vis enkel innførsel

dc.contributor.authorBoyd, Colin Alexander
dc.contributor.authorHale, Britta
dc.contributor.authorMjølsnes, Stig Frode
dc.contributor.authorStebila, Douglas
dc.date.accessioned2018-02-09T13:07:58Z
dc.date.available2018-02-09T13:07:58Z
dc.date.created2016-10-13T13:54:23Z
dc.date.issued2016
dc.identifier.isbn978-3-319-29485-8
dc.identifier.urihttp://hdl.handle.net/11250/2483752
dc.description.abstractAuthentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all protect against forgeries, but offer varying levels of protection against replays, reordering, and drops. As a result of the lack of a systematic hierarchy of authentication and AEAD security notions, gaps have arisen in the literature, specifically in the provable security analysis of the Transport Layer Security (TLS) protocol. We present a hierarchy of authentication and AEAD security notions, interpolating between the lowest level of protection (against forgeries) and the highest level (against forgeries, replays, reordering, and drops). We show generically how to construct higher level schemes from a basic scheme and appropriate use of sequence numbers, and apply that to close the gap in the analysis of TLS record layer encryption.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringernb_NO
dc.relation.ispartofTopics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
dc.titleFrom Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLSnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber55-71nb_NO
dc.identifier.doi10.1007/978-3-319-29485-8_4
dc.identifier.cristin1391513
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Cryptographers’ Track at the RSA Conference]. The final authenticated version is available online at: https://link.springer.com/chapter/10.1007%2F978-3-319-29485-8_4#enumerationnb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for telematikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel