Skip to main content

Cryptographic Protocols: From the Abstract to the Practical to the Actual

  • Conference paper
Financial Cryptography and Data Security (FC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7126))

Included in the following conference series:

  • 1102 Accesses

Abstract

We identify three levels of cryptographic research and development: Starting from the general “abstract” design level, the first layer includes much of theoretical cryptography, and general engineering principles (most present in cryptographic conferences). The second level is of designs which are contributed to systems and international standards, and include mechanisms ready to be implemented in hardware and software; we call this level “practical.” Finally, the third level which we call “actual,” includes fielded cryptography as external contribution to, and part of “general (hardware/ software) engineering projects,” requiring cryptographic participation and supervision throughout the life cycle of the constructed system. I briefly review these three levels and their connections; (the treatment is based on personal experience and is, therefore, subjective). The position expressed here motivates the need for a scientific forum on“real life cryptographic designs and protocols,” to deal with the interactions between the three levels from actual real life perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yung, M. (2012). Cryptographic Protocols: From the Abstract to the Practical to the Actual. In: Danezis, G., Dietrich, S., Sako, K. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7126. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29889-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29889-9_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29888-2

  • Online ISBN: 978-3-642-29889-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics