Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Taming the Adversary Martn Abadi
 

Summary: Taming the Adversary
Mart’n Abadi
Bell Labs Research, Lucent Technologies
abadi@lucent.com
www.pa.bell­labs.com/~abadi
Abstract. While there is a great deal of sophistication in modern cryp­
tology, simple (and simplistic) explanations of cryptography remain use­
ful and perhaps necessary. Many of the explanations are informal; others
are embodied in formal methods, particularly in formal methods for the
analysis of security protocols. This note (intended to accompany a talk
at the Crypto 2000 conference) describes some of those explanations. It
focuses on simple models of attacks, pointing to partial justifications of
these models.
1 Polite Adversaries
Some of the simplest explanations of cryptography rely on analogies with physi­
cal objects, such as safes, locks, and sealed envelopes. These explanations are cer­
tainly simplistic. Nevertheless, and in spite of the sophistication of modern cryp­
tology, these and other simplifications can be helpful when used appropriately.
The simplifications range from informal metaphors to rigorous abstract models,
and include frequent omissions of detail and conceptual conflations (e.g., [28]).

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences