Title :
Protocol design for integrity protection
Author :
Stubblebine, Stuart G. ; Gligor, Virgil D.
Author_Institution :
USC Inf. Sci. Inst., Marina del Rey, CA, USA
Abstract :
The authors present a design method for message integrity protection. They illustrate the use of the method by designing large classes of message types whose integrity is provably preserved and by applying the method to the symmetric key option of the privacy-enhanced electronic mail protocol to help discover and eliminate an integrity vulnerability. The method is independent of the specific encryption system and checksum/digest functions used. It expresses desirable requirements for message integrity protection in terms of abstract encryption and checksum/digest properties, and relates these properties to the message type representation, and lifetime of the protocol run and keys used. The use of the method is illustrated by the design of a large class of message types whose integrity is provably preserved in the face of active intruder attacks. In particular, the method is used to help discover and eliminate a vulnerability in the symmetric-key option of the privacy-enhanced electronic mail (PEM) protocol for the internet
Keywords :
data integrity; electronic mail; internetworking; message authentication; protocols; abstract encryption; active intruder attacks; checksum/digest functions; encryption; integrity protection; integrity vulnerability; internet; message integrity protection; message type representation; privacy-enhanced electronic mail; privacy-enhanced electronic mail protocol; protocol; symmetric key option; symmetric-key option; Cryptographic protocols; Cryptography; Design methodology; Digital signatures; Educational institutions; Electronic mail; Internet; Neodymium; Protection; Terminology;
Conference_Titel :
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-3370-0
DOI :
10.1109/RISP.1993.287644