• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 10 (6), 2011
  3. 1068-1091
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 6 | Page No.: 1068-1091
DOI: 10.3923/itj.2011.1068.1091

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 618

Search


Authors


Bo Meng


Keywords


  • review
  • verification
  • Security property
  • protocol security
Review Article

A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model

Bo Meng
Security protocols and cryptographic primitive play a very important role in information security world. People have paid a serious attention to the methods to verify security properties in security protocols and cryptographic primitives. From 1980's two distinct approaches: Symbolic approach and computational approach have been proposedd for it. Recently, significant advances have been made in verification on security properties in security protocols and cryptographic primitives and these two approaches. In this study we survey the existing results on the fields including symmetric encryption, public key encryption, digital signature, hush function, secrecy, key cycles, information flow, secrecy, automatic proof, deniable authentication protocol, electronic payment protocol and internet voting protocol in symbolic model and computational model. The survey processes in two lines: One line follows the trace of emergence and developments of verification on security properties in security protocols and cryptographic primitives. The other line is to discuss what methods are usedd and how to verify these security properties during the developments. Finally we give the existing results on verification on security properties in security protocols and cryptographic primitives in symbolic model and computational model.
PDF Fulltext XML References Citation

How to cite this article

Bo Meng, 2011. A Survey on Analysis of Selected Cryptographic Primitives and Security Protocols in Symbolic Model and Computational Model. Information Technology Journal, 10: 1068-1091.

DOI: 10.3923/itj.2011.1068.1091

URL: https://scialert.net/abstract/?doi=itj.2011.1068.1091

Related Articles

Mechanized Verification of Security Properties of Transport Layer Security 1.2 Protocol with Crypto Verif in Computational Model
Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model
UC Secure Network Coding Against Pollution Attacks
Two-layer Cellular Automata Based Cryptography
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus
Formalizing Deniability
A Critical Review of Receipt-Freeness and Coercion-Resistance
Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model
Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif
Computationally Sound Mechanized Proofs for Deniable Authentication Protocols with a Probabilistic Polynomial Calculus in Computational Model

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved