Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
نویسندگان
چکیده
Security of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. We show that symbolic trace reachability for well-defined protocols is decidable in presence of the exclusive or theory in combination with the homomorphism axiom. These theories allow us to model basic properties of important cryptographic operators. This trace reachability problem can be expressed as a system of symbolic deducibility constraints for a certain inference system describing the capabilities of the attacker. One main step of our proof consists in reducing deducibility constraints to constraints for deducibility in one step of the inference system. This constraint system, in turn, can be expressed as a system of quadratic equations of a particular form over Z/2Z[h], the ring of polynomials in one indeterminate over the finite field Z/2Z. We show that satisfiability of such systems is decidable.
منابع مشابه
S . Delaune , P . Lafourcade , D . Lugiez , R . Treinen Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or Research Report LSV - 05 - 20 November 2005
The symbolic verification of the security property of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. Such a problem can be expressed as a constraint system for deducibility constraints for a certain inference system describing the possible actions of an attacker. We show that symbolic trace reachability for well-defined p...
متن کاملSymbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability problem in the presence of an Abelian group operator (e.g., multiplication) can be reduced to solvability of a decidable system of quadratic Diophantine equations. This result enables complete, fully automated formal analysis of protocols that employ primitives such as Diffie-Hellman exponentiation,...
متن کاملSymbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation
We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability problem in the presence of an Abelian group operator (e.g., multiplication) can be reduced to solvability of a particular system of quadratic Diophantine equations. This result enables formal analysis of protocols that employ primitives such as Diffie-Hellman exponentiation, products, and xor, with ...
متن کاملDisabling equational theories in unification for cryptographic protocol analysis through tagging
Most of the research on protocol security in the past two decades has been conducted assuming a free message algebra. However, operators such as Exclusive-OR (XOR) possess algebraic properties. There were instances when a protocol was secure in the free algebra, but insecure in the presence of equational theories induced by such operators [10]. Hence, it is important to conduct protocol analysi...
متن کاملHow to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks are notorious threats to cryptographic protocol security. They are arguably the most commonly reported attacks on protocols. For nearly fifteen years, researchers have continuously emphasized the importance of preventing these attacks. In their classical works, Heather et al. and Guttman et al. proved that these could be prevented by tagging encrypte...
متن کامل