all InfoSec news
On the usefulness of linear types for correct nonce use enforcement during compile time. (arXiv:2305.04138v1 [cs.CR])
May 9, 2023, 1:10 a.m. | Richard Ostertág
cs.CR updates on arXiv.org arxiv.org
Cryptographic algorithms and protocols often need unique random numbers as
parameters (e.g. nonces). Failure to satisfy this requirement lead to
vulnerable implementation and can result in security breach. We show how linear
types and static type checking can be used to enforce the correct generation of
a new unique random number for each function invocation.
algorithms breach enforcement nonce numbers protocols random random numbers result security security breach types vulnerable
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Senior PAM Security Engineer
@ Experian | Hyderabad, India
Cybersecurity Analyst II
@ Spry Methods | Washington, DC (Hybrid)
Cyber Security Engineer
@ Expleo | Gothenburg, AC, Sweden
Cybersecurity – Information System Security Manager (ISSM)
@ Boeing | USA - Albuquerque, NM
Senior Security Engineer - Canada
@ DataVisor | Ontario, Canada - Remote
Cybersecurity Architect
@ HARMAN International | JP Tokyo 3-5-7 Ariake Koto-ku