Abstract
We identify three levels of cryptographic research and development: Starting from the general “abstract” design level, the first layer includes much of theoretical cryptography, and general engineering principles (most present in cryptographic conferences). The second level is of designs which are contributed to systems and international standards, and include mechanisms ready to be implemented in hardware and software; we call this level “practical.” Finally, the third level which we call “actual,” includes fielded cryptography as external contribution to, and part of “general (hardware/ software) engineering projects,” requiring cryptographic participation and supervision throughout the life cycle of the constructed system. I briefly review these three levels and their connections; (the treatment is based on personal experience and is, therefore, subjective). The position expressed here motivates the need for a scientific forum on“real life cryptographic designs and protocols,” to deal with the interactions between the three levels from actual real life perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yung, M. (2012). Cryptographic Protocols: From the Abstract to the Practical to the Actual. In: Danezis, G., Dietrich, S., Sako, K. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7126. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29889-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-29889-9_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29888-2
Online ISBN: 978-3-642-29889-9
eBook Packages: Computer ScienceComputer Science (R0)