A major primitive missing in that library so far is symmetric encryption. We show why symmetric encryption is harder to idealize in a way that allows general composition than existing primitives in this library. We discuss several approaches to overcome these problems. For our favorite approach we provide a detailed provably secure idealization of symmetric encryption within the given framework for constructing nested terms.
Category / Keywords: foundations / cryptographic protocols, security analysis of protocols, formal methods, Dolev-Yao, symmetric encryption, cryptographically composable operators Date: received 23 Feb 2004 Contact author: mbc at zurich ibm com Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | BibTeX Citation Version: 20040223:215329 (All versions of this report) Discussion forum: Show discussion | Start new discussion