Skip to main content

The Correctness of Crypto Transaction Sets

Discussion

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2133))

Included in the following conference series:

Abstract

This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I’m going to discuss is, what’s the next problem to tackle once we’ve done crypto protocols? We keep on saying that crypto-protocols appear to be “done” and then some new application comes along to give us more targets to work on — multi-media, escrow, you name it. But sooner or later, it seems reasonable to assume, crypto will be done. What’s the next thing to do?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. RJ Anderson, ‘Security Engineering-a Guide to Building Dependable Distributed Systems’, Wiley (2001) ISBN 0-471-38922-6

    Google Scholar 

  2. RJ Anderson, “Why Cryptosystems Fail” in Communications of the ACM vol 37 no 11 (November 1994) pp 32–40; earlier version at http://www.cl.cam.ac.uk/users/rja14/wcf.html

    Article  Google Scholar 

  3. RJ Anderson, SJ Bezuidenhoudt, “On the Reliability of Electronic Payment Systems”, in IEEE Transactions on Software Engineering vol 22 no 5 (May 1996) pp 294–301; http://www.cl.cam.ac.uk/ftp/users/rja14/meters.ps.gz

    Article  Google Scholar 

  4. RJ Anderson, MG Kuhn, “Tamper Resistance-a Cautionary Note”, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1–11; http://www.cl.cam.ac.uk/users/rja14/tamper.html

  5. RJ Anderson, MG Kuhn, “Low Cost Attacks on Tamper Resistant Devices”, in Security Protocols-Proceedings of the 5th International Workshop (1997) Springer LNCS vol 1361 pp 125–136

    Google Scholar 

  6. M Blaze, “Protocol Failure in the Escrowed Encryption Standard”, in Second ACM Conference on Computer and Communications Security, 2–4 November 1994, Fairfax, Va; proceedings published by the ACM ISBN 0-89791-732-4, pp 59–67; at http://www.crypto.com/papers/

  7. IBM, ‘IBM 4758 PCI Cryptographic Coprocessor-CCA Basic Services Reference and Guide, Release 1.31 for the IBM 4758-001, available through http://www.ibm.com/security/cryptocards/

  8. CH Meyer, SM Matyas, ‘Cryptography: A New Dimension in Computer Data Security’, Wiley, 1982

    Google Scholar 

  9. SW Moore, RJ Anderson, MG Kuhn, “Improving Smartcard Security using Self-timed Circuit Technology”, Fourth ACiD-WG Workshop, Grenoble, ISBN 2-913329-44-6, 2000; at http://www.g3card.com/

  10. GJ Simmons, “How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy”, GJ Simmons, Proceedings of the IEEE v 76 no 5 (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, R. (2001). The Correctness of Crypto Transaction Sets. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-44810-1_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42566-3

  • Online ISBN: 978-3-540-44810-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics