Soundness of Formal Encryption in the Presence of Active Adversaries
Source: University of California
Cryptographic protocols are a fundamental tool in the design of secure distributed computing systems, but they are also extremely hard to design and validate. The difficulty of designing valid cryptographic protocols stems mostly from the fact that security properties should remain valid even when the protocol is executed in an unpredictable adversarial environment, where some of the parties (Or an external entity) are maliciously attempting to make the protocol deviate from its prescribed behavior. Two approaches have been developed to formulate and validate security properties: the logic approach and the cryptographic approach.