Abstract
Establishing a secure communication channel between two parties is a nontrivial problem, especially when one or both are humans. Unlike computers, humans cannot perform strong cryptographic operations without supporting technology, yet this technology may itself be compromised. We introduce a general communication topology model to facilitate the analysis of security protocols in this setting. We use it to completely characterize all topologies that allow secure communication between a human and a remote server via a compromised computer. These topologies are relevant for a variety of applications, including online banking and Internet voting. Our characterization can serve to guide the design of novel solutions for applications and to quickly exclude proposals that cannot possibly offer secure communication.
Original language | English |
---|---|
Title of host publication | 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015 |
Subtitle of host publication | Proceedings |
Place of Publication | Piscataway |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 199-213 |
Number of pages | 15 |
ISBN (Electronic) | 9781467375382 |
DOIs | |
Publication status | Published - 2015 |
Event | 28th IEEE Computer Security Foundations Symposium - University of Verona, Polo Zanotto , Verona, Italy Duration: 13 Jul 2015 → 17 Jul 2015 http://csf2015.di.univr.it/ (Link to Conference website) |
Publication series
Name | Proceedings of the IEEE |
---|---|
Publisher | IEEE |
ISSN (Electronic) | 2374-8303 |
Conference
Conference | 28th IEEE Computer Security Foundations Symposium |
---|---|
Abbreviated title | CSF 2015 |
Country/Territory | Italy |
City | Verona |
Period | 13/07/15 → 17/07/15 |
Internet address |
|
Keywords
- Formal modeling
- Security ceremonies
- Security protocols
ASJC Scopus subject areas
- Software