Symbolic Bisimulation in the Spi Calculus
نویسندگان
چکیده
The spi calculus is an executable model for the description and analysis of cryptographic protocols. Security objectives like secrecy and authenticity can be formulated as equations between spi calculus terms, where equality is interpreted as a contextual equivalence. One problem with verifying contextual equivalences for message-passing process calculi is the infinite branching on process input. In this paper, we propose a general symbolic semantics for the spi calculus, where an input prefix gives rise to only one transition. To avoid infinite quantification over contexts, non-contextual concrete bisimulations approximating barbed equivalence have been defined. We propose a symbolic bisimulation that is sound with respect to barbed equivalence, and brings us closer to automated bisimulation checks. 1 Background, Related Work, and Summary Verification of Cryptographic Protocols in the Spi Calculus. Abadi and Gordon designed the spi calculus as an extension of the pi calculus with encryption primitives in order to describe and formally analyze cryptographic protocols [AG99]. The success of the spi calculus is due to at least three reasons. (1) It is equipped with an operational semantics; thus any protocol described in the calculus may be regarded as executable. (2) Security properties can be formulated as equations on process terms, so no external formalism is needed. (3) Contextual equivalences on process terms avoid the need to explicitly model the attacker; they take into account any attacker that can be expressed in the calculus. For example, we may wish to analyze the trivial cryptographic protocol (νk) (A |B) where A := a〈Ekm〉 and B := a(x).f〈Dkx〉 consisting of participant A sending on channel a the messagem, encrypted under the secret shared symmetric key k, to participant B who tries to decrypt the received message and, in case of successful decryption, outputs the result on channel f . We may compare this protocol with its specification (νk) (A |B) where A := a〈Ekm〉 and B := a(y).[Dky :M ]f〈m〉 where B transmits the correct message m on channel f whenever the dummy message (on reception bound to y) can be decrypted (as expressed by the guard [Dky :M ]). If the equation (νk) (A |B) = (νk) (A |B) holds, then no context is able to influence the authenticity (more precisely: integrity) of the message m. Apart from the equational style, cryptographic protocols in the spi calculus are analyzed by control flow analysis, trace analysis, reachability analysis, and type systems; they are beyond the scope of this paper. ? Supported by the Swiss National Science Foundation, grant No. 21-65180.1. 2 Johannes Borgström, Sébastien Briais, Uwe Nestmann symbolic bisi. [this paper] +3 ? hedged bisi. ks [BN02, BDP02] +3
منابع مشابه
A Symbolic Characterisation of Open Bisimulation for the Spi Calculus
Open hedged bisimulation was proposed as a generalisation to the spi calculus of the pi calculus’open bisimulation. In this paper, we extend previous work on open hedged bisimulation. We show that open hedged bisimilarity is closed under respectful substitutions and give a symbolic characterisation of open hedged bisimulation. The latter result is an important step towards mechanisation of open...
متن کاملA Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
A notion of open bisimulation is formulated for the spi calculus, an extension of the π-calculus with cryptographic primitives. In this formulation, open bisimulation is indexed by pairs of symbolic traces, which represent the history of interactions between the environment with the pairs of processes being checked for bisimilarity. The use of symbolic traces allows for a symbolic treatment of ...
متن کاملA Trace Based Bisimulation for the Spi Calculus
A notion of open bisimulation is formulated for the spi calculus, an extension of the πcalculus with cryptographic primitives. In this formulation, open bisimulation is indexed by pairs of symbolic traces, which represent the history of interactions between the environment with the pairs of processes being checked for bisimilarity. The use of symbolic traces allows for a symbolic treatment of b...
متن کاملA Complete Symbolic Bisimilarity for an Extended Spi Calculus
Several symbolic notions of bisimilarity have been defined for the spi calculus and the applied pi calculus. In this paper, we treat a spi calculus with a general constructor-destructor message algebra, and define a symbolic bisimilarity that is both sound and complete with respect to its concrete counterpart.
متن کاملFormalising Observer Theory for Environment-Sensitive Bisimulation
We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the knowledge and capabilities of an observer, and can be given a formal account using deductive systems, such as those used in various “environment-sensitive” bisimulation for process calculi, e.g., the spi-calculus. Two notions are ...
متن کامل