Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or

LICS(2003)

引用 253|浏览313
暂无评分
摘要
We present decidability results for the verification ofcryptographic protocols in the presence of equational theoriescorresponding to xorand Abelian groups. Since theperfect cryptography assumption is unrealistic for cryptographicprimitives with visible algebraic properties such asxor, we extend the conventional Dolev-Yao model by permittingthe intruder to exploit these properties. We showthat the ground reachability problem in NP for the extendedintruder theories in the cases of xor and Abelian groups.This result follows from a normal proof theorem. Then, weshow how to lift this result in the xorcase: we consider asymbolic constraint system expressing the reachability (e.g.,secrecy) problem for a finite number of sessions. We provethat such constraint system is decidable, relying in particularon an extension of combination algorithms for unificationprocedures. As a corollary, this enables automaticsymbolic verification of cryptographic protocols employingxorfor a fixed number of sessions.
更多
查看译文
关键词
finite number,constraint system,intruder deductions,asymbolic constraint system,abelian group,ground reachability problem,decidability result,insecurity decision,automaticsymbolic verification,fixed number,combination algorithm,verification ofcryptographic protocol,theorem proving,formal verification,xor,authentication,exclusive or,polynomials,algebra,cryptographic protocol,protocols,context modeling,cryptography,computer science,cryptographic protocols,decidability,logic
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要