From: Tom St Denis on
On Feb 5, 1:15 am, g...(a)nope.ucsd.edu (Greg Rose) wrote:
> In article <7xaavotiu3....(a)ruckus.brouhaha.com>,
> Paul Rubin  <no.em...(a)nospam.invalid> wrote:
>
> >Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no> writes:
> >> That said, there is an argument for applying formal methods and
> >> computer verification to cryptographic protocols.  In my experience,
> >> I lose confidence in my "proofs" as my cryptographic protocols become
> >> more complicated.  Formal, automatically verifiable proofs may work
> >> well here.
>
> >Quite a lot of programming language theory papers these days include
> >machine-checked proofs.  I've been wondering wondering why they're not
> >more common in cryptography.  Any idea?
>
> Very little in cryptography is actually reducible
> to axioms. It's very difficult to state things like
> "factoring is hard" in a way that provers can use.

I think it's hard to state factoring is hard regardless of writing
style because that has NEVER been proven to be true.

Tom
From: Kristian Gj�steen on
Paul Rubin <no.email(a)nospam.invalid> wrote:
>Kristian Gjøsteen <kristiag+news(a)math.ntnu.no> writes:
>> That said, there is an argument for applying formal methods and
>> computer verification to cryptographic protocols. In my experience,
>> I lose confidence in my "proofs" as my cryptographic protocols become
>> more complicated. Formal, automatically verifiable proofs may work
>> well here.
>
>Quite a lot of programming language theory papers these days include
>machine-checked proofs. I've been wondering wondering why they're not
>more common in cryptography. Any idea?

I'm guessing that you need to adapt the techniques to apply to
cryptographic proofs as they are currently phrased.

--
Kristian Gj�steen
From: WTShaw on
On Feb 5, 11:19 am, Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no>
wrote:
> Paul Rubin  <no.em...(a)nospam.invalid> wrote:
>
> >Kristian Gjøsteen <kristiag+n...(a)math.ntnu.no> writes:
> >> That said, there is an argument for applying formal methods and
> >> computer verification to cryptographic protocols.  In my experience,
> >> I lose confidence in my "proofs" as my cryptographic protocols become
> >> more complicated.  Formal, automatically verifiable proofs may work
> >> well here.
>
> >Quite a lot of programming language theory papers these days include
> >machine-checked proofs.  I've been wondering wondering why they're not
> >more common in cryptography.  Any idea?
>
> I'm guessing that you need to adapt the techniques to apply to
> cryptographic proofs as they are currently phrased.
>
> --
> Kristian Gjøsteen

Having used several computer languages in writing crypto, I have long
ago become aware that hand calculated values are at times necessary to
verify that machine results are true. From my experience as a digital
designer, the physics and pointed hat wizardry to get layouts right
can't be assumed. Delicate wiring loops can cause improper results.
As for languages, sins by omission on the part of programmers can be a
problem, surely for different versions and platforms. It's a pain to
verify but necessary, even more to validate your own programs by
trying them on different machines, systems, and any other available
variations. Theory goes nowhere without field testing.

Yes in reference to proving induction, somewhere mentioned the above
entries, surely such might sometimes be done with deduction especially
as those classes of algorithm usage, not necessarily the inverse or
with forward acting inductions with escape mechanisms.