On the Reachability Problem in Cryptographic Protocols

نویسندگان

  • Roberto M. Amadio
  • Denis Lugiez
چکیده

We study the veri cation of secrecy and authenticity properties for cryptographic protocols which rely on symmetric shared keys. The veri cation can be reduced to check whether a certain parallel program which models the protocol and the speci cation can reach an erroneous state while interacting with the environment. Assuming nite principals, we present a simple decision procedure for the reachability problem which is based on a `symbolic' reduction system. Key-words: Cryptographic protocols, veri cation, symbolic computation. The authors work at Centre de Mathémathiques et d'Informatique (LIM-CNRS), 39 rue Joliot-Curie, F13453, Marseille, France. e-mail: {amadio,lugiez}@cmi.univ-mrs.fr. The rst author is a member of Action MIMOSA and is partially supported by the working group CONFER and the RNRT project MARVEL. Sur le problème d'accessibilité dans les protocoles cryptographiques Résumé : Nous étudions la véri cation de propriétés de sécurité et d'authenticité dans les protocoles cryptographiques à clef symétrique. La véri cation consiste à s'assurer que certains programmes parallèles qui modélisent le protocole et la spéci cation ne peuvent pas accéder à un état erroné tout en interagissant avec l'environnement. En supposant les principaux nis, nous présentons une simple procédure de décision pour le problème d'accessibilité qui est basée sur un système de réduction symbolique. Mots-clés : Protocoles cryptographiques, véri cation, calcul symbolique. On the reachability problem in cryptographic protocols 3

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or

We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We sh...

متن کامل

A Constraint-Based Algorithm for Contract-Signing Protocols

Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was shown that certain game-theoretic security properties, such as balance for contract-signing protocols, are decidable in a Dolev-Yao style model with a bounded number of sessions but unbounded message size. However, this...

متن کامل

On the Complexity of Verifying Cyber-Physical Security Protocols

Many security protocols rely on the assumptions 1 on the physical properties in which its protocol sessions will be 2 carried out. For instance, Distance Bounding Protocols take into 3 account the round trip time of messages and the transmission 4 velocity to infer an upper bound of the distance between two 5 agents. We classify such security protocols as Cyber-Physical. 6 The key elements of s...

متن کامل

Analysis of Reachability Properties in Communicating Authorization Policies

Cryptographic protocols and authorization policies are two leading techniques for securing software systems. The former are concerned with the enforcement of secure communications in distributed systems, while the latter specify which users under which conditions can be granted access to resources of a system. The two have been mostly studied in isolation. Indeed, there are a number of algorith...

متن کامل

On Name Generation and Set-Based Analysis in the Dolev-Yao Model

We study the control reachability problem in the Dolev-Yao model of cryptographic protocols when principals are represented by tail recursive processes with generated names. We propose a conservative approximation of the problem by reduction to a non-standard collapsed operational semantics and we introduce checkable syntactic conditions entailing the equivalence of the standard and the collaps...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000