Formal testing cryptographic protocols

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words "testing" and "the analysis" we shall count synonyms.

Original languageEnglish
Title of host publication6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005
Pages236-237
Number of pages2
Volume2005
Publication statusPublished - 1 Dec 2005
Event6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 - Erlagol, Altai, Russian Federation
Duration: 1 Jul 20055 Jul 2005

Conference

Conference6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005
CountryRussian Federation
CityErlagol, Altai
Period1.7.055.7.05

Fingerprint

Authentication
Cryptography
Information technology
Testing

Keywords

  • Cryptography protocol
  • Protocol
  • Testing

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Igumnov, V. S. (2005). Formal testing cryptographic protocols. In 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005 (Vol. 2005, pp. 236-237). [1523251]

Formal testing cryptographic protocols. / Igumnov, Vladislav S.

6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005. Vol. 2005 2005. p. 236-237 1523251.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Igumnov, VS 2005, Formal testing cryptographic protocols. in 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005. vol. 2005, 1523251, pp. 236-237, 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005, Erlagol, Altai, Russian Federation, 1.7.05.
Igumnov VS. Formal testing cryptographic protocols. In 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005. Vol. 2005. 2005. p. 236-237. 1523251
Igumnov, Vladislav S. / Formal testing cryptographic protocols. 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005. Vol. 2005 2005. pp. 236-237
@inproceedings{5ea846c192dd4d07aa17602b13923a00,
title = "Formal testing cryptographic protocols",
abstract = "For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words {"}testing{"} and {"}the analysis{"} we shall count synonyms.",
keywords = "Cryptography protocol, Protocol, Testing",
author = "Igumnov, {Vladislav S.}",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "5778204914",
volume = "2005",
pages = "236--237",
booktitle = "6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005",

}

TY - GEN

T1 - Formal testing cryptographic protocols

AU - Igumnov, Vladislav S.

PY - 2005/12/1

Y1 - 2005/12/1

N2 - For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words "testing" and "the analysis" we shall count synonyms.

AB - For last 60 years in cryptography new directions have appeared. One of such directions is cryptographic protocols (CP). Now cryptographic protocols are widely used In Information technologies. They solve such problems as division of a secret, identification, authentication, the blind signature, maintenance of integrity, etc. Construction CP is complexity problem. It is necessary to construct CP in such a manner that he completely would execute the function, and any malefactor could not prevent in correct performance CP, and also take the confidential information from intercepted messages between participants of the protocol. Therefore now the problem of analysis CP which will show weaknesses (vulnerability) CP is actual. As a result of the carried out analysis it becomes possible or to correct found vulnerability, or to refuse use CP. Words "testing" and "the analysis" we shall count synonyms.

KW - Cryptography protocol

KW - Protocol

KW - Testing

UR - http://www.scopus.com/inward/record.url?scp=33749072535&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33749072535&partnerID=8YFLogxK

M3 - Conference contribution

SN - 5778204914

SN - 9785778204911

VL - 2005

SP - 236

EP - 237

BT - 6th Annual International Siberian Workshop and Tutorials on Electron Devices and Materials, EDM 2005

ER -