Intruder deductions, constraint solving and insecurity decision in presence of exclusive or

被引:96
作者
Comon-Lundh, H [1 ]
Shmatikov, V [1 ]
机构
[1] LSV, INRIA, F-94235 Cachan, France
来源
18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS | 2003年
关键词
D O I
10.1109/LICS.2003.1210067
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We show that the ground reachability problem in NP for the extended intruder theories in the cases of xor and Abelian groups. This result follows from a normal proof theorem. Then, we show how to lift this result in the xor case: we consider a symbolic constraint system expressing the reachability (e.g., secrecy) problem for a finite number of sessions. We prove, that such constraint system is decidable, relying in particular on an extension of combination algorithms for unification procedures. As a corollary, this enables automatic symbolic verification of cryptographic protocols employing xor for a fixed number of sessions.
引用
收藏
页码:271 / 280
页数:10
相关论文
共 19 条
[1]  
Amadio R., 2000, LECT NOTES COMPUTER, V1877, P380
[2]  
[Anonymous], LNCS
[3]  
Baader F, 2001, LECT NOTES COMPUT SC, V2002, P104
[4]  
BOREALE M, 2001, P ICALP 01, P667
[5]  
chevalier Y, 2003, NP DECISION PROCEDUR
[6]  
COMON H, 2001, P ICALP 01, P682
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]  
DURGIN N, 1999, WORKSH FORM METH SEC
[9]   Computing symbolic models for verifying cryptographic protocols [J].
Fiore, M ;
Abadi, M .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :160-173
[10]   AUTOMATIC RECOGNITION OF TRACTABILITY IN INFERENCE RELATIONS [J].
MCALLESTER, DA .
JOURNAL OF THE ACM, 1993, 40 (02) :284-303