Abstract
Establishing a secure communication channel between two parties is a nontrivial problem, especially when one or both are humans. Unlike computers, humans cannot perform strong cryptographic operations without supporting technology, yet this technology may itself be compromised. We introduce a general communication topology model to facilitate the analysis of security protocols in this setting. We use it to completely characterize all topologies that allow secure communication between a human and a remote server via a compromised computer. These topologies are relevant for a variety of applications, including online banking and Internet voting. Our characterization can serve to guide the design of novel solutions for applications and to quickly exclude proposals that cannot possibly offer secure communication.
Original language | English |
---|---|
Title of host publication | 28th IEEE Computer Security Foundations Symposium 2015 |
Publisher | IEEE |
Pages | 199-213 |
Number of pages | 15 |
ISBN (Electronic) | 9781467375382 |
DOIs | |
Publication status | Published - 7 Sept 2015 |
Event | 28th IEEE Computer Security Foundations Symposium 2015 - Verona, Italy Duration: 13 Jul 2015 → 17 Jul 2015 |
Conference
Conference | 28th IEEE Computer Security Foundations Symposium 2015 |
---|---|
Abbreviated title | CSF 2015 |
Country/Territory | Italy |
City | Verona |
Period | 13/07/15 → 17/07/15 |
Keywords
- Formal Modeling
- Security Ceremonies
- Security Protocols