Automatic inference of cryptographic key length based on analysis of proof tightness
Swenningsen, Derek L.
MetadataShow full item record
Currently, reasoning about key lengths within a security scheme involves utilizing generalized recommendations or conducting lengthy manual analyses of how security parameters relate to the security of the scheme. In this paper, we provide the tools necessary for automating reasoning about key lengths and effective security within a security scheme. We first formalize the reasoning about cryptographic proofs within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for maintaining and automatically reasoning about these expanded attack trees. We provide a software tool that utilizes machine-readable proof and attack metadata and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need to rely on generalized recommendations and provides timely reanalysis when newfound attacks or proofs surface. We validate our software tool within the Schnorr public-key signature scheme as a case study.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Courtney, David W. (Monterey, California: Naval Postgraduate School, 2016-09);The ability to securely disseminate data in a timely manner is critical to military missions within a hostile environment. Tactical wireless sensor networks (WSN) consist of power-constrained devices spread throughout a ...
Barrus, Joseph; Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 1998-06);We propose a distributed architecture with autonomous agents to monitor security-related activity within a network. Each agent operates cooperatively yet independently of the others, providing for efficiency, realtime response ...
Wright, Roger; Shifflett, David J.; Irvine, Cynthia E. (Procedings of the 1998 Command and Control Research and Technology Symposium, Monterey, 1998-06-00);We propose a distributed architecture with autonomous agents to monitor security-related activity within a network. Each agent operates cooperatively yet independently of the others, providing for efficiency, real-time ...