Certified Programs and Proofs

Volume 7679 of the series Lecture Notes in Computer Science pp 7-8

Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs

  • Gilles BartheAffiliated withIMDEA Software Institute
  • , Benjamin GrégoireAffiliated withINRIA Sophia Antipolis-Méditerranée
  • , César KunzAffiliated withIMDEA Software InstituteUniversidad Politécnica de Madrid
  • , Yassine LakhnechAffiliated withUniversité de Grenoble
  • , Santiago Zanella BéguelinAffiliated withMicrosoft Research

* Final gross prices may vary according to local VAT.

Get Access


CertiCrypt [3] and EasyCrypt [2] are machine-checked frameworks for proving the security of cryptographic constructions. Both frameworks adhere to the gamebased approach [9,6,8] to provable security [7], but revisit its realization from a formal verification pespective. More specifically, CertiCrypt and EasyCrypt use a probabilistic programming language pWHILE for expressing cryptographic constructions, security properties, and computational assumptions, and a probabilistic relational Hoare logic pRHL for justifying reasonings in cryptographic proofs. While both tools coincide in their foundations, they differ in their underlying technologies: CertiCrypt is implemented as a set of libraries in the Coq proof assistant, whereas EasyCrypt uses a verification condition generator for pRHL in combination with off-the-shelf SMT solvers and automated theorem provers. Over the last six years, we have used both tools to verify prominent examples of public-key encryption schemes, modes of operation, signature schemes, hash function designs, zero-knowledge proofs. Recently, we have also used both tools to certify the output of a zero-knowledge compiler [1].