On the Reachability Problem in Cryptographic Protocols
نویسندگان
چکیده
We study the veri cation of secrecy and authenticity properties for cryptographic protocols which rely on symmetric shared keys. The veri cation can be reduced to check whether a certain parallel program which models the protocol and the speci cation can reach an erroneous state while interacting with the environment. Assuming nite principals, we present a simple decision procedure for the reachability problem which is based on a `symbolic' reduction system. Key-words: Cryptographic protocols, veri cation, symbolic computation. The authors work at Centre de Mathémathiques et d'Informatique (LIM-CNRS), 39 rue Joliot-Curie, F13453, Marseille, France. e-mail: {amadio,lugiez}@cmi.univ-mrs.fr. The rst author is a member of Action MIMOSA and is partially supported by the working group CONFER and the RNRT project MARVEL. Sur le problème d'accessibilité dans les protocoles cryptographiques Résumé : Nous étudions la véri cation de propriétés de sécurité et d'authenticité dans les protocoles cryptographiques à clef symétrique. La véri cation consiste à s'assurer que certains programmes parallèles qui modélisent le protocole et la spéci cation ne peuvent pas accéder à un état erroné tout en interagissant avec l'environnement. En supposant les principaux nis, nous présentons une simple procédure de décision pour le problème d'accessibilité qui est basée sur un système de réduction symbolique. Mots-clés : Protocoles cryptographiques, véri cation, calcul symbolique. On the reachability problem in cryptographic protocols 3
منابع مشابه
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We sh...
متن کاملA Constraint-Based Algorithm for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was shown that certain game-theoretic security properties, such as balance for contract-signing protocols, are decidable in a Dolev-Yao style model with a bounded number of sessions but unbounded message size. However, this...
متن کاملOn the Complexity of Verifying Cyber-Physical Security Protocols
Many security protocols rely on the assumptions 1 on the physical properties in which its protocol sessions will be 2 carried out. For instance, Distance Bounding Protocols take into 3 account the round trip time of messages and the transmission 4 velocity to infer an upper bound of the distance between two 5 agents. We classify such security protocols as Cyber-Physical. 6 The key elements of s...
متن کاملAnalysis of Reachability Properties in Communicating Authorization Policies
Cryptographic protocols and authorization policies are two leading techniques for securing software systems. The former are concerned with the enforcement of secure communications in distributed systems, while the latter specify which users under which conditions can be granted access to resources of a system. The two have been mostly studied in isolation. Indeed, there are a number of algorith...
متن کاملOn Name Generation and Set-Based Analysis in the Dolev-Yao Model
We study the control reachability problem in the Dolev-Yao model of cryptographic protocols when principals are represented by tail recursive processes with generated names. We propose a conservative approximation of the problem by reduction to a non-standard collapsed operational semantics and we introduce checkable syntactic conditions entailing the equivalence of the standard and the collaps...
متن کامل