Automatic inference of cryptographic key length based on analysis of proof tightness
Author
Swenningsen, Derek L.
Date
2016-06Advisor
Gondree, Mark
Second Reader
Dinolt, George
Metadata
Show full item recordAbstract
Currently, reasoning about key lengths within a security scheme involves utilizing generalized recommendations or conducting lengthy manual analyses of how security parameters relate to the security of the scheme. In this paper, we provide the tools necessary for automating reasoning about key lengths and effective security within a security scheme. We first formalize the reasoning about cryptographic proofs within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for maintaining and automatically reasoning about these expanded attack trees. We provide a software tool that utilizes machine-readable proof and attack metadata and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need to rely on generalized recommendations and provides timely reanalysis when newfound attacks or proofs surface. We validate our software tool within the Schnorr public-key signature scheme as a case study.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2012);IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Technology for Homeland Security: Best Papers. As the field of homeland defense and security expands and matures, the contributions from various disciplines become ... -
Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-04);April 2006. Welcome to the third edition of Homeland Security Affairs. Our Spring 2006 issue features articles about intelligence and homeland security, the demarcations between homeland defense and security, and ideas ... -
Homeland Security Affairs Journal, Volume I - 2005: Issue 2, Fall
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ...