Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
نویسندگان
چکیده
We consider the question of the adequacy of symbolic models versus computational models for the verification of security protocols. We neither try to include properties in the symbolic model that reflect the properties of the computational primitives nor add computational requirements that enforce the soundness of the symbolic model. We propose in this paper a different approach: everything is possible in the symbolic model, unless it contradicts a computational assumption. In this way, we obtain unconditional soundness almost by construction. And we do not need to assume the absence of dynamic corruption or the absence of key-cycles, which are examples of hypotheses that are always used in related works. We set the basic framework, for arbitrary cryptographic primitives and arbitrary protocols, however for trace security properties only. The main points of this work have been published in the proceedings of POST’12 [8]. This paper largely agrees with that publication, but in Section 2.6 we present an improved computational semantics. This improvement allows us to state our main theorem for any first order formula, while in the POST publication, the possible formulas were somewhat restricted. Moreover, we introduced here Section 4, which explains the connection between our results and an earlier result of Fitting about embedding (first-order) classical logic into (first-order) S4.
منابع مشابه
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attacker of Bana and Comon (BC) [6]. In this paper we argue that the real breakthrough of this technique is the recent introduction of its version for i...
متن کاملA tool for automating the computationally complete symbolic attacker ( Extended Abstract )
The design of automated security proofs is a topic extensively studied for over 20 years. One problem that was raised about 12 years ago is the validity (or the scope) of such proofs. Symbolic models are quite far from the implementation. In contrast, modern cryptography typically considers more powerful attackers. This includes of course some computations that are not explicitly specified. Thi...
متن کاملIndistinguishability and the Computationally Complete Symbolic Attacker ( Extended Abstract )
Recently, we proposed a technique [1] to define a computationally complete symbolic attacker for the verification of security protocols. Such a symbolic attacker can do everything computational attackers can, and hence it is possible to avoid the numerous usual restrictions computational soundness theorems require; in other words, unconditional soundness can be achieved. The main idea is that i...
متن کاملComputationally Complete Symbolic Attacker in Action
We show that the recent technique of computationally complete symbolic attackers proposed by Bana and Comon-Lundh [6] for computationally sound verification of security protocols is powerful enough to verify actual protocols. In their work, Bana and Comon-Lundh presented only the general framework, but they did not introduce sufficiently many axioms to actually prove protocols. We present a set...
متن کاملComputationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker
In this paper we show that the recent technique of computationally complete symbolic attackers proposed by Bana and Comon-Lundh [7] for computationally sound verification is powerful enough to verify actual protocols, such as the Needham-Schroeder-Lowe Protocol. In their model, one does not define explicit Dolev-Yao adversarial capabilities but rather the limitations (axioms) of the adversarial...
متن کامل