Type-based cryptographic operations

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Cryptographic types are a way to express cryptographic guarantees (of secrecy and integrity) in a type system for a network programming language. This allows some of these guarantees to be checked statically, before a network program executes. Where dynamic checks are required, these are represented at the source language level as dynamic type-checking, and are translated by the compiler to lower level cryptographic operations. Static checking has the important advantage that it provides static guarantees of the reliability of a network application. It can also help to avoid the unnecessary overhead of runtime cryptographic operations where communication is through a trusted medium (e.g., the OS kernel, or a trusted subnet). Cryptographic types can also be used to build application-specific security protocols, where type-checking in the lower layers of the protocol stack verifies security properties for upper layers. Cryptographic types are described formally using two process calculi: a simple but limited calculus of virtual and actual cryptographic operations, the sec-calculus; and a more sophisticated calculus of type-based cryptographic operations, the ec-calculus. Correctness is verified for a scheme for compiling type operations in the ec-calculus to cryptographic operations.

Original languageEnglish
Pages (from-to)485-550
Number of pages66
JournalJournal of Computer Security
Volume12
Issue number3-4 SPEC. ISS.
DOIs
StatePublished - 2004

Fingerprint

Dive into the research topics of 'Type-based cryptographic operations'. Together they form a unique fingerprint.

Cite this