Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or

نویسندگان

  • Stéphanie Delaune
  • Pascal Lafourcade
  • Denis Lugiez
  • Ralf Treinen
چکیده

Security of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. We show that symbolic trace reachability for well-defined protocols is decidable in presence of the exclusive or theory in combination with the homomorphism axiom. These theories allow us to model basic properties of important cryptographic operators. This trace reachability problem can be expressed as a system of symbolic deducibility constraints for a certain inference system describing the capabilities of the attacker. One main step of our proof consists in reducing deducibility constraints to constraints for deducibility in one step of the inference system. This constraint system, in turn, can be expressed as a system of quadratic equations of a particular form over Z/2Z[h], the ring of polynomials in one indeterminate over the finite field Z/2Z. We show that satisfiability of such systems is decidable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

S . Delaune , P . Lafourcade , D . Lugiez , R . Treinen Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or Research Report LSV - 05 - 20 November 2005

The symbolic verification of the security property of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. Such a problem can be expressed as a constraint system for deducibility constraints for a certain inference system describing the possible actions of an attacker. We show that symbolic trace reachability for well-defined p...

متن کامل

Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation

We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability problem in the presence of an Abelian group operator (e.g., multiplication) can be reduced to solvability of a decidable system of quadratic Diophantine equations. This result enables complete, fully automated formal analysis of protocols that employ primitives such as Diffie-Hellman exponentiation,...

متن کامل

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation

We demonstrate that for any well-defined cryptographic protocol, the symbolic trace reachability problem in the presence of an Abelian group operator (e.g., multiplication) can be reduced to solvability of a particular system of quadratic Diophantine equations. This result enables formal analysis of protocols that employ primitives such as Diffie-Hellman exponentiation, products, and xor, with ...

متن کامل

Disabling equational theories in unification for cryptographic protocol analysis through tagging

Most of the research on protocol security in the past two decades has been conducted assuming a free message algebra. However, operators such as Exclusive-OR (XOR) possess algebraic properties. There were instances when a protocol was secure in the free algebra, but insecure in the presence of equational theories induced by such operators [10]. Hence, it is important to conduct protocol analysi...

متن کامل

How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR

Type-flaw attacks and multi-protocol attacks are notorious threats to cryptographic protocol security. They are arguably the most commonly reported attacks on protocols. For nearly fifteen years, researchers have continuously emphasized the importance of preventing these attacks. In their classical works, Heather et al. and Guttman et al. proved that these could be prevented by tagging encrypte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006