Encoding cryptographic primitives in a calculus with polyadic synchronization
نویسندگان
چکیده
We thoroughly study the behavioral theory of epi, a π-calculus extended with polyadic synchronization. We show that the natural contextual equivalence, barbed congruence, coincides with early bisimilarity, which is thus its co-inductive characterization. Moreover, we relate early bisimilarity with the other usual notions, ground, late and open, obtaining a lattice of equivalence relations that clarifies the relashionship among the “standard” bisimilarities. Furthermore, we apply the theory developed to obtain an expressiveness result: epi extended with (symmetrical) key encryption primitives may be fully abstractly encoded in the original epi calculus. The proposed encoding is sound and complete with respect to barbed congruence. Therefore, cryptographic epi (cryptoepi) gets behavioral theory for free, what contrasts with other process languages with cryptographic constructs that usually require a big effort to develop such theory. Therefore, it is thus possible to use crypto-epi to analyze and to verify properties of security protocols using equational reasoning. To illustrate this claim, we prove the correctness of a protocol of secure message exchange.
منابع مشابه
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملA Survey of Name-Passing Calculi and Crypto-Primitives
The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons. First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap. Secondly, the literature o...
متن کاملGraph Types for Monadic Mobile Processes
While types for name passing calculi have been studied extensively in the context of sorting of polyadic π-calculus [26, 7, 43, 11, 36, 41, 24, 42, 14, 22], the type abstraction on the corresponding level is not possible in the monadic setting, which was left as an open issue by Milner [26]. We solve this problem with an extension of sorting which captures dynamic aspects of process behaviour i...
متن کاملComparing communication primitives via their relative expressive power
In this paper, we study sixteen communication primitives, arising from the combination of four useful programming features: synchronism (synchronous vs asynchronous primitives), arity (monadic vs polyadic data), communication medium (message passing vs shared dataspaces) and pattern-matching. Some of these primitives have already been used in at least one language which has appeared in the lite...
متن کاملImplementing Spi Calculus Using Nominal Techniques
The aim of this work is to obtain an interactive proof environment based on Isabelle/HOL for reasoning formally about cryptographic protocols, expressed as processes of the spi calculus (a π-calculus with cryptographic primitives). To this end, we formalise syntax, semantics, and hedged bisimulation, an environment-sensitive bisimulation which can be used for proving security properties of prot...
متن کامل