Security critical applications often store keys on dedicated HSM or key-management servers to separate highly sensitive cryptographic operations from more vulnerable parts of the network. Access to such devices is given to protocol parties by the means of Security APIs, e.g., the RSA PKCS#11 standard, IBM's CCA and the TPM API, all of which protect keys by providing an API that allows to address keys only indirectly. This thesis has two parts. The first part deals with formal methods that allow for the identification of secure configurations in which Security APIs improve the security of existing protocols, e.g., in scenarios where parties can be corrupted. A promising paradigm is to regard the Security API as a participant in a protocol a...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
International audienceSecurity APIs, key servers and protocols that need to keep the status of trans...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Security APIs are used to define the boundary between trusted and untrusted code. The security prope...
Security APIs are used to define the boundary between trusted and untrusted code. The security prope...
Security APIs, key servers and protocols that need to keep the status of transactions, require to ma...
The presence of big scale networks in our modern society is affecting our usual practice, which as a...
The presence of big scale networks in our modern society is affecting our usual practice, which as a...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceSecurity APIs, key servers and protocols that need to keep the status of trans...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
International audienceSecurity APIs, key servers and protocols that need to keep the status of trans...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Dans une infrastructure logicielle, les systèmes critiques ont souvent besoin de garder des clés cry...
Security APIs are used to define the boundary between trusted and untrusted code. The security prope...
Security APIs are used to define the boundary between trusted and untrusted code. The security prope...
Security APIs, key servers and protocols that need to keep the status of transactions, require to ma...
The presence of big scale networks in our modern society is affecting our usual practice, which as a...
The presence of big scale networks in our modern society is affecting our usual practice, which as a...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceSecurity APIs, key servers and protocols that need to keep the status of trans...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
International audienceSecurity APIs, key servers and protocols that need to keep the status of trans...
International audienceSecurity APIs are used to define the boundary between trusted and untrusted co...