May 9, 2023, 1:10 a.m. | Richard Ostertág

cs.CR updates on arXiv.org arxiv.org

Cryptographic algorithms and protocols often need unique random numbers as
parameters (e.g. nonces). Failure to satisfy this requirement lead to
vulnerable implementation and can result in security breach. We show how linear
types and static type checking can be used to enforce the correct generation of
a new unique random number for each function invocation.

algorithms breach enforcement nonce numbers protocols random random numbers result security security breach types vulnerable

Senior PAM Security Engineer

@ Experian | Hyderabad, India

Cybersecurity Analyst II

@ Spry Methods | Washington, DC (Hybrid)

Cyber Security Engineer

@ Expleo | Gothenburg, AC, Sweden

Cybersecurity – Information System Security Manager (ISSM)

@ Boeing | USA - Albuquerque, NM

Senior Security Engineer - Canada

@ DataVisor | Ontario, Canada - Remote

Cybersecurity Architect

@ HARMAN International | JP Tokyo 3-5-7 Ariake Koto-ku