Cryptographically verified implementations for TLS

K Bhargavan, C Fournet, R Corin… - Proceedings of the 15th …, 2008 - dl.acm.org
Proceedings of the 15th ACM conference on Computer and communications security, 2008dl.acm.org
We intend to narrow the gap between concrete implementations of cryptographic protocols
and their verified models. We develop and verify a small functional implementation of the
Transport Layer Security protocol (TLS 1.0). We make use of the same executable code for
interoperability testing against mainstream implementations, for automated symbolic
cryptographic verification, and for automated computational cryptographic verification. We
rely on a combination of recent tools, and we also develop a new tool for extracting …
We intend to narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable code for interoperability testing against mainstream implementations, for automated symbolic cryptographic verification, and for automated computational cryptographic verification. We rely on a combination of recent tools, and we also develop a new tool for extracting computational models from executable code. We obtain strong security guarantees for TLS as used in typical deployments.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果