International audienceWe present an analysis of key wrapping APIs with generic policies. We prove that certain minimal conditions on policies are sufficient for keys to be indistinguishable from random in any execution of an API. Our result captures a large class of API policies, including both the hierarchies on keys that are common in the scientific literature and the non-linear dependencies on keys used in PKCS#11. Indeed, we use our result to propose a secure refinement of PKCS#11, assuming that the attributes of keys are transmitted as authenticated associated data when wrapping and that there is an enforced separation between keys used for wrapping and keys used for other cryptographic purposes. We use the Computationally Complete Sym...
In the past few years, cryptographic key management APIs have been shown to be subject to tricky att...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly ca...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
Abstract. We extend Delaune, Kremer and Steel’s framework for anal-ysis of PKCS#11-based APIs from b...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
In the past few years, cryptographic key management APIs have been shown to be subject to tricky att...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
In the past few years, cryptographic key management APIs have been shown to be subject to tricky att...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly ca...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
Abstract. We extend Delaune, Kremer and Steel’s framework for anal-ysis of PKCS#11-based APIs from b...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
In the past few years, cryptographic key management APIs have been shown to be subject to tricky att...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
In the past few years, cryptographic key management APIs have been shown to be subject to tricky att...
International audienceKey conjuring is the process by which an attacker obtains an unknown, encrypte...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly ca...