TY - GEN
T1 - Cryptographic types
AU - Duggan, D.
N1 - Publisher Copyright:
© 2002 IEEE.
PY - 2002
Y1 - 2002
N2 - Cryptographic types are a way to express cryptographic guarantees (of secrecy and integrity) in a type system for a network programming language. This allows some of these guarantees to be checked statically, before a network program executes. Where dynamic checks are required, these are represented at the source language level as dynamic type-checking, and are translated by the compiler to lower level cryptographic operations. Static checking avoids the unnecessary overhead of run-time cryptographic operations where communication is through a trusted medium (e.g. the OS kernel, or a trusted subnet), and also provides static guarantees of the reliability of a network application. Cryptographic types can also be used to build application-specific security protocols, where type-checking in the lower layers of the protocol stack verifies security properties for upper layers. Cryptographic types are described formally using a process calculus, the ec-calculus. Correctness is verified for a scheme for compiling type operations to cryptographic operations.
AB - Cryptographic types are a way to express cryptographic guarantees (of secrecy and integrity) in a type system for a network programming language. This allows some of these guarantees to be checked statically, before a network program executes. Where dynamic checks are required, these are represented at the source language level as dynamic type-checking, and are translated by the compiler to lower level cryptographic operations. Static checking avoids the unnecessary overhead of run-time cryptographic operations where communication is through a trusted medium (e.g. the OS kernel, or a trusted subnet), and also provides static guarantees of the reliability of a network application. Cryptographic types can also be used to build application-specific security protocols, where type-checking in the lower layers of the protocol stack verifies security properties for upper layers. Cryptographic types are described formally using a process calculus, the ec-calculus. Correctness is verified for a scheme for compiling type operations to cryptographic operations.
KW - Computer languages
KW - Computer science
KW - Cryptographic protocols
KW - IP networks
KW - Pervasive computing
KW - Protection
KW - Public key
KW - Public key cryptography
KW - Runtime
KW - Telecommunication traffic
UR - http://www.scopus.com/inward/record.url?scp=84948736825&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84948736825&partnerID=8YFLogxK
U2 - 10.1109/CSFW.2002.1021819
DO - 10.1109/CSFW.2002.1021819
M3 - Conference contribution
AN - SCOPUS:84948736825
T3 - Proceedings of the Computer Security Foundations Workshop
SP - 238
EP - 252
BT - Proceedings - 15th IEEE Computer Security Foundations Workshop, CSFW 2002
T2 - 15th IEEE Computer Security Foundations Workshop, CSFW 2002
Y2 - 24 June 2002 through 26 June 2002
ER -