High-level Cryptographic Abstractions

10/22/2018
by   Christopher Kane, et al.
0

The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. This paper proposes high-level abstractions consisting of simple cryptographic primitives and declarative configuration. These abstractions can be implemented on top of any cryptographic library in any language. We have implemented these abstractions in Python, and used them to write a variety of well-known security protocols, including Signal, Kerberos, and TLS. We show that programs using our abstractions are much smaller and easier to write than using low-level libraries, and are safe against the vast majority of cryptographic misuse reported in the literature. Size of security protocol implementations are reduced by about a third on average when written with our abstractions. We also show that our implementation incurs a small overhead, less than 5 microseconds for shared key operations and less than 341 microseconds (< 1

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2021

Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly

This paper explores the use of relational symbolic execution to counter ...
research
10/03/2018

Towards Low-level Cryptographic Primitives for JavaCards

JavaCard is a multi-application security platform deployed to over twent...
research
07/11/2021

You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

The security of the Internet rests on a small number of open-source cryp...
research
03/14/2012

Evolving Culture vs Local Minima

We propose a theory that relates difficulty of learning in deep architec...
research
09/25/2020

Flexible Performant GEMM Kernels on GPUs

General Matrix Multiplication or GEMM kernels take centre place in high ...
research
09/21/2022

CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

Recently, interest has been emerging in the application of symbolic tech...
research
04/21/2020

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version

Implementation flaws in cryptographic libraries, design flaws in algorit...

Please sign up or login with your details

Forgot password? Click here to reset