Verifying Cryptographic Software Correctness with Respect to Reference Implementations

  • José Bacelar Almeida
  • Manuel Barbosa
  • Jorge Sousa Pinto
  • Bárbara Vieira
Conference paper

DOI: 10.1007/978-3-642-04570-7_5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5825)
Cite this paper as:
Almeida J.B., Barbosa M., Sousa Pinto J., Vieira B. (2009) Verifying Cryptographic Software Correctness with Respect to Reference Implementations. In: Alpuente M., Cook B., Joubert C. (eds) Formal Methods for Industrial Critical Systems. FMICS 2009. Lecture Notes in Computer Science, vol 5825. Springer, Berlin, Heidelberg

Abstract

This paper presents techniques developed to check program equivalences in the context of cryptographic software development, where specifications are typically reference implementations. The techniques allow for the integration of interactive proof techniques (required given the difficulty and generality of the results sought) in a verification infrastructure that is capable of discharging many verification conditions automatically. To this end, the difficult results in the verification process (to be proved interactively) are isolated as a set of lemmas. The fundamental notion of natural invariant is used to link the specification level and the interactive proof construction process.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • José Bacelar Almeida
    • 1
  • Manuel Barbosa
    • 1
  • Jorge Sousa Pinto
    • 1
  • Bárbara Vieira
    • 1
  1. 1.CCTC / Departamento de InformáticaUniversidade do MinhoBragaPortugal

Personalised recommendations