Skip to main content

Showing 1–5 of 5 results for author: Koutsos, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1904.04606  [pdf, other

    cs.CR

    The Last Mile: High-Assurance and High-Speed Cryptographic Implementations

    Authors: José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub

    Abstract: We develop a new approach for building cryptographic implementations. Our approach goes the last mile and delivers assembly code that is provably functionally correct, protected against side-channels, and as efficient as hand-written assembly. We illustrate ur approach using ChaCha20-Poly1305, one of the mandatory ciphersuites in TLS 1.3, and deliver formally verified vectorized implementations wh… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

  2. arXiv:1811.06936  [pdf, other

    cs.CR cs.LO

    Deciding Indistinguishability

    Authors: Adrien Koutsos

    Abstract: Computational indistinguishability is a key property in cryptography and verification of security protocols. Current tools for proving it rely on cryptographic game transformations. We follow Bana and Comon's approach, axiomatizing what an adversary cannot distinguish. We prove the decidability of a set of first-order axioms that are both computationally sound and expressive enough. This can be… ▽ More

    Submitted 10 May, 2019; v1 submitted 16 November, 2018; originally announced November 2018.

  3. arXiv:1811.06922  [pdf, other

    cs.CR

    The 5G-AKA Authentication Protocol Privacy

    Authors: Adrien Koutsos

    Abstract: We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the use of asymmetric randomized encryption. Nonetheless, we show that except for the IMSI-catcher attack, all known attacks against 5G-AKA privacy still apply. Next, we modify the 5G-AKA protocol to prevent thes… ▽ More

    Submitted 3 April, 2019; v1 submitted 16 November, 2018; originally announced November 2018.

    Comments: Changes: - added details when describing some attacks. - added a constant message in the AKA+ protocol

  4. arXiv:1705.10482  [pdf, other

    cs.CR cs.PL

    A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications

    Authors: Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei

    Abstract: The present paper proposes the first static analysis for Android applications which is both flow-sensitive on the heap abstraction and provably sound with respect to a rich formal model of the Android platform. We formulate the analysis as a set of Horn clauses defining a sound over-approximation of the semantics of the Android application to analyse, borrowing ideas from recency abstraction and e… ▽ More

    Submitted 12 June, 2017; v1 submitted 30 May, 2017; originally announced May 2017.

  5. arXiv:1705.02296  [pdf, other

    cs.CR

    Formal Computational Unlinkability Proofs of RFID Protocols

    Authors: Hubert Comon, Adrien Koutsos

    Abstract: We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of hash functions (Collision-Resistance, PRF); ii) To formalize computational unlinkability in the model; iii) To illustrate the method, providing t… ▽ More

    Submitted 5 May, 2017; originally announced May 2017.