Cryptographic types

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Cryptographic types are a way to express cryptographic guarantees (of secrecy and integrity) in a type system for a network programming language. This allows some of these guarantees to be checked statically, before a network program executes. Where dynamic checks are required, these are represented at the source language level as dynamic type-checking, and are translated by the compiler to lower level cryptographic operations. Static checking avoids the unnecessary overhead of run-time cryptographic operations where communication is through a trusted medium (e.g. the OS kernel, or a trusted subnet), and also provides static guarantees of the reliability of a network application. Cryptographic types can also be used to build application-specific security protocols, where type-checking in the lower layers of the protocol stack verifies security properties for upper layers. Cryptographic types are described formally using a process calculus, the ec-calculus. Correctness is verified for a scheme for compiling type operations to cryptographic operations.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE Computer Security Foundations Workshop, CSFW 2002
Pages238-252
Number of pages15
ISBN (Electronic)0769516890
DOIs
StatePublished - 2002
Event15th IEEE Computer Security Foundations Workshop, CSFW 2002 - Cape Breton, Canada
Duration: 24 Jun 200226 Jun 2002

Publication series

NameProceedings of the Computer Security Foundations Workshop
Volume2002-January
ISSN (Print)1063-6900

Conference

Conference15th IEEE Computer Security Foundations Workshop, CSFW 2002
Country/TerritoryCanada
CityCape Breton
Period24/06/0226/06/02

Keywords

  • Computer languages
  • Computer science
  • Cryptographic protocols
  • IP networks
  • Pervasive computing
  • Protection
  • Public key
  • Public key cryptography
  • Runtime
  • Telecommunication traffic

Fingerprint

Dive into the research topics of 'Cryptographic types'. Together they form a unique fingerprint.

Cite this