High-Level Cryptographic Abstractions

被引:1
|
作者
Kane, Christopher [1 ]
Lin, Bo [1 ]
Chand, Saksham [1 ]
Stoller, Scott D. [1 ]
Liu, Yanhong A. [1 ]
机构
[1] SUNY Stony Brook, Stony Brook, NY 11794 USA
关键词
cryptographic API; declarative configuration; high-level abstraction; AUTHENTICATION; ENCRYPTION; PROTOCOLS; SECURE; TOOL;
D O I
10.1145/3338504.3357343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while also allowing maximum control when needed. This paper proposes such high-level abstractions consisting of simple cryptographic primitives and full declarative configuration. These abstractions can be implemented on top of any cryptographic library in any language. We have implemented these abstractions in Python, and used them to write a wide variety of well-known security protocols, including Signal, Kerberos, and TLS. We show that programs using our abstractions are much smaller and easier to write than using low-level libraries, where size of security protocols implemented is reduced by about a third on average. We show our implementation incurs a small overhead, less than 5 microseconds for shared key operations and less than 341 microseconds (< 1%) for public key operations. We also show our abstractions are safe against main types of cryptographic misuse reported in the literature.
引用
收藏
页码:31 / 43
页数:13
相关论文
共 50 条
  • [41] HIGH-LEVEL SUPPORT
    SMITH, L
    FORTUNE, 1991, 123 (12) : 52 - 52
  • [42] HIGH-LEVEL PIRACY
    不详
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1650): : 318 - 318
  • [43] COBOL HIGH-LEVEL
    SEIWELL, B
    INFOSYSTEMS, 1981, 28 (03): : 6 - 6
  • [44] HIGH-LEVEL SYNTHESIS
    PAWLAK, A
    MICROPROCESSING AND MICROPROGRAMMING, 1992, 35 (1-5): : 261 - 261
  • [45] IS THERE HIGH-LEVEL CAUSATION?
    Fenton-Glynn, Luke
    ERGO-AN OPEN ACCESS JOURNAL OF PHILOSOPHY, 2017, 4 : 845 - 898
  • [46] HIGH-LEVEL PRAISE
    DEBALL, LM
    BYTE, 1992, 17 (03): : 14 - &
  • [47] High-Level Consumption
    Warburton, Clark
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1935, 180 : 226 - 226
  • [48] Can High-Level Synthesis Compete Against a Hand-Written Code in the Cryptographic Domain? A Case Study
    Homsirikamol, Ekawat
    Gaj, Kris
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [49] Supporting XML based high-level abstractions on HDF5 datasets: A case study in automatic data virtualization
    Sahoo, SK
    Agrawal, G
    LANGUAGES AND COMPILERS FOR HIGH PERFORMANCE COMPUTING, 2005, 3602 : 299 - 318
  • [50] SHiLA: Synthesizing High-Level Assertions for High-Speed Validation of High-Level Designs
    Riazati, Mohammad
    Daneshtalab, Masoud
    Sjodin, Mikael
    Lisper, Bjorn
    2020 23RD INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS 2020), 2020,