Cryptography In Progress

SingleKey / LiquidKey

Novel cryptographic key management system design requiring formal security proofs, protocol analysis, side-channel resistance evaluation, and implementation security review. Cross-model verification is critical for security claims.


The Problem

Cryptographic protocol design presents unique challenges for any review methodology:

  • Security proofs require formal mathematical verification -- intuition and analogy are insufficient
  • Side-channel vulnerabilities exist in implementation, not protocol specification, requiring separate analysis layers
  • Protocol composition: individually secure components can produce insecure combinations
  • Adversary model specification must be explicit and complete; implicit assumptions are fatal
  • Key management lifecycle (generation, distribution, storage, rotation, revocation) introduces operational vulnerabilities that protocol-level analysis cannot address

The fundamental challenge: a single incorrect assumption in a security proof invalidates the entire construction. Traditional code review catches implementation bugs but not protocol-level flaws. Formal methods catch protocol flaws but miss implementation side channels. No single expert domain covers the full attack surface.

FDRP Application

Expert Domain Expansion

Formal Methods

Protocol verification using symbolic analysis (ProVerif, Tamarin) for authentication properties, secrecy, and forward secrecy guarantees.

Side-Channel Analysis

Timing attacks, power analysis, cache-based attacks on implementation. Constant-time evaluation of critical operations.

Protocol Verification

Composition security analysis. Does the key management protocol remain secure when composed with transport, storage, and authentication protocols?

Why Cross-Model Verification Is Critical

Security claims are uniquely dangerous when wrong. A false positive (claiming a protocol is secure when it is not) can lead to deployment of vulnerable systems. FDRP applies:

Independent Model Security Analysis
Each verification model is prompted as a specialist cryptographer and independently evaluates the protocol against its adversary model. Disagreements between models are treated as potential vulnerabilities until resolved.
Formal-Informal Cross-Check
Formal verification results are checked against informal expert reasoning. If a formal proof succeeds but an expert has an intuitive concern, the proof assumptions are audited for implicit weaknesses.
Implementation-Protocol Gap Analysis
Side-channel experts review whether the implementation faithfully follows the protocol specification. Deviations (even performance optimizations) are flagged as potential attack surfaces.

This case study is in progress. Security review results will be published upon completion of the formal verification cycle.