30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.2. CRYPTOGRAPHIC PRIMITIVES 5<br />

1.2.1 Concatenation<br />

The concatenation, denoted by “·”, is commonly used in cryptographic protocols<br />

to construct messages. The concatenation algorithm “·” is represented by a<br />

function that takes a couple <strong>of</strong> messages as input <strong>and</strong> outputs their concatenation,<br />

for example the concatenation <strong>of</strong> “a” <strong>and</strong> “b” is “a· b”.<br />

We give below the algebraic properties <strong>of</strong> the concatenation:<br />

1.2.2 Exclusive or<br />

Associativity : (x · y) · z = x · (y · z)<br />

Unary : x · ɛ = ɛ · x = x<br />

The exclusive or, denoted by “⊕” or “XOR”, is commonly used in cryptographic<br />

protocols to construct messages, it has the following algebraic properties:<br />

1.2.3 Pairing<br />

Associativity : (x ⊕ y) ⊕ z = x ⊕ (y ⊕ z)<br />

Commutativity : x ⊕ y = y ⊕ x<br />

Unary : x ⊕ ɛ = x<br />

Nilpotence : x ⊕ x = ɛ<br />

The pairing, denoted by “〈−, −〉”, is commonly used in cryptographic protocols<br />

to construct messages, it has the following algebraic properties:<br />

1 st projection : π1〈x, y〉 = x<br />

2 nd projection : π2〈x, y〉 = y<br />

where π1 <strong>and</strong> π2 denote the projection functions. The main difference between<br />

the pairing <strong>and</strong> the concatenation is that the pairing is not associative, i.e.<br />

〈x, 〈y, z〉〉 �= 〈〈x, y〉, z〉.<br />

1.2.4 Encryption schemes<br />

We have two types <strong>of</strong> encryption schemes: the public (or asymmetric) encryption<br />

schemes <strong>and</strong> the symmetric encryption schemes.<br />

Public encryption schemes<br />

The public encryption schemes, also called asymmetric encryption schemes, have<br />

been initially introduced by W. Diffie <strong>and</strong> M. Hellman [101] <strong>and</strong> R. Merkle [154].<br />

A “public encryption scheme” is defined by three algorithms: the encryption<br />

algorithm “enc p ”, the decryption algorithm “dec p ”, <strong>and</strong> the key generation algorithm

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!