all InfoSec news
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
April 8, 2024, 4:11 a.m. | Simon Jeanteur, Laura Kov\'acs, Matteo Maffei, Michael Rawson
cs.CR updates on arXiv.org arxiv.org
Abstract: Cryptographic protocols are hard to design and prove correct, as witnessed by the ever-growing list of attacks even on protocol standards. Symbolic models of cryptography enable automated formal security proofs of such protocols against an idealized model, which abstracts away from the algebraic properties of cryptographic schemes and thus misses attacks. Computational models yield rigorous guarantees but support at present only interactive proofs and/or restricted classes of protocols. A promising approach is given by the …
arxiv attacker attacks automated automated reasoning cryptographic cryptography cs.cr cs.lo design enable hard list protocol protocols prove reasoning security standards
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
SITEC- Systems Security Administrator- Camp HM Smith
@ Peraton | Camp H.M. Smith, HI, United States
Cyberspace Intelligence Analyst
@ Peraton | Fort Meade, MD, United States
General Manager, Cybersecurity, Google Public Sector
@ Google | Virginia, USA; United States
Cyber Security Advisor
@ H&M Group | Stockholm, Sweden
Engineering Team Manager – Security Controls
@ H&M Group | Stockholm, Sweden