Abstract
This talk follows on more from the talks by Larry Paulson and Giampaolo Bella that we had earlier. The problem I’m going to discuss is, what’s the next problem to tackle once we’ve done crypto protocols? We keep on saying that crypto-protocols appear to be “done” and then some new application comes along to give us more targets to work on — multi-media, escrow, you name it. But sooner or later, it seems reasonable to assume, crypto will be done. What’s the next thing to do?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
RJ Anderson, ‘Security Engineering-a Guide to Building Dependable Distributed Systems’, Wiley (2001) ISBN 0-471-38922-6
RJ Anderson, “Why Cryptosystems Fail” in Communications of the ACM vol 37 no 11 (November 1994) pp 32–40; earlier version at http://www.cl.cam.ac.uk/users/rja14/wcf.html
RJ Anderson, SJ Bezuidenhoudt, “On the Reliability of Electronic Payment Systems”, in IEEE Transactions on Software Engineering vol 22 no 5 (May 1996) pp 294–301; http://www.cl.cam.ac.uk/ftp/users/rja14/meters.ps.gz
RJ Anderson, MG Kuhn, “Tamper Resistance-a Cautionary Note”, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1–11; http://www.cl.cam.ac.uk/users/rja14/tamper.html
RJ Anderson, MG Kuhn, “Low Cost Attacks on Tamper Resistant Devices”, in Security Protocols-Proceedings of the 5th International Workshop (1997) Springer LNCS vol 1361 pp 125–136
M Blaze, “Protocol Failure in the Escrowed Encryption Standard”, in Second ACM Conference on Computer and Communications Security, 2–4 November 1994, Fairfax, Va; proceedings published by the ACM ISBN 0-89791-732-4, pp 59–67; at http://www.crypto.com/papers/
IBM, ‘IBM 4758 PCI Cryptographic Coprocessor-CCA Basic Services Reference and Guide, Release 1.31 for the IBM 4758-001, available through http://www.ibm.com/security/cryptocards/
CH Meyer, SM Matyas, ‘Cryptography: A New Dimension in Computer Data Security’, Wiley, 1982
SW Moore, RJ Anderson, MG Kuhn, “Improving Smartcard Security using Self-timed Circuit Technology”, Fourth ACiD-WG Workshop, Grenoble, ISBN 2-913329-44-6, 2000; at http://www.g3card.com/
GJ Simmons, “How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy”, GJ Simmons, Proceedings of the IEEE v 76 no 5 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, R. (2001). The Correctness of Crypto Transaction Sets. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_18
Download citation
DOI: https://doi.org/10.1007/3-540-44810-1_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42566-3
Online ISBN: 978-3-540-44810-5
eBook Packages: Springer Book Archive