Algebraic Intruder Deductions ( Extended Version ) ?
نویسندگان
چکیده
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally analyzing protocols, since basic problems like the equality of terms that represent cryptographic messages are undecidable, even for relatively simple algebraic theories. We present a framework for security protocol analysis that can handle algebraic properties of cryptographic operators in a uniform and modular way. Our framework is based on two ideas: the use of modular rewriting to formalize a generalized equational deduction problem for the DolevYao intruder, and the introduction of two parameters that control the complexity of the equational unification problems that arise during protocol analysis by bounding the depth of message terms and the operations that the intruder can perform when analyzing messages. We motivate the different restrictions made in our model by highlighting different ways in which undecidability arises when incorporating algebraic properties of cryptographic operators into formal protocol analysis.
منابع مشابه
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We sh...
متن کاملAlgebraic Intruder Deductions
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally analyzing protocols, since basic problems like the equality of terms that represent cryptographic messages are undecidable, even for relatively simple algebraic theories. We present a framework for security protocol analysis that c...
متن کاملA quantitative algebraic analysis of BB’84 with maximal entropy
The paper provides a quantitative algebraic analysis of a BB’84-type quantum key distribution protocol. The analysis is done in an algebraic setting, where classical and quantum variables form a module for the quantale formed from the communication and quantum actions. The module-quantale pair is endowed with sup-maps that encode uncertainties of agents involved in the protocol, about the varia...
متن کاملDiffie-Hellman without Difficulty (Extended Version)
An excellent way for a protocol to obtain shared keys is Diffie-Hellman. For the automated verification of security protocols, the use of Diffie-Hellman poses a certain amount of difficulty, because it requires algebraic reasoning. Several tools work in the free algebra and even for tools that do support Diffie-Hellman, the algebraic reasoning becomes a bottleneck. We provide a new relative-sou...
متن کاملA formal model of Diffie-Hellman using CSP and rank functions
Formal analysis techniques have proved successful in finding flaws in security protocols. Such techniques typically assume the presence of perfect encryption, an assumption that is clearly not true in practice. When we aim to prove the correctness of a protocol, we must be more careful in assuming bounds on the capabilities of the intruder: a real intruder can, and will, exploit properties of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005