Stéphanie Delaune
نویسندگان
چکیده
We propose a symbolic semantics for the finite applied pi calculus.The applied pi calculus is a variant of the pi calculus with extensions formodelling cryptographic protocols. By treating inputs symbolically, oursemantics avoids potentially infinite branching of execution trees due toinputs from the environment. Correctness is maintained by associatingwith each process a set of constraints on terms. We define a symbolic la-belled bisimulation relation, which is shown to be sound but not completewith respect to standard bisimulation. We explore the lack of complete-ness and demonstrate that the symbolic bisimulation relation is sufficientfor many practical examples. This work is an important step towardsautomation of observational equivalence for the finite applied pi calculus,e.g. for verification of anonymity or strong secrecy properties. ∗This work has been partly supported by the EPSRC projects EP/E029833, VerifyingProperties in Electronic Voting Protocols and EP/E040829/1, Verifying Anonymity and Pri-vacy Properties of Security Protocols, the ARA SESUR project AVOTÉ and the ARTIST2NoE. Preliminary versions of this paper appeared in [13] and [14].
منابع مشابه
Stéphanie Delaune , Steve Kremer and Mark D . Ryan Symbolic bisimulation for the applied pi calculus Research Report LSV - 07 - 14 April 2007
We propose a symbolic semantics for the finite applied pi calculus, which is a variant of the pi calculus with extensions for modelling cryptgraphic protocols. By treating inputs symbolically, our semantics avoids potentially infinite branching of execution trees due to inputs from the environment. Correctness is maintained by associating with each process a set of constraints on symbolic terms...
متن کاملStéphanie Delaune , Steve Kremer and Graham Steel Formal Analysis of
PKCS#11 defines an API for cryptographic devices that has been widely adopted in industry. However, it has been shown to be vulnerable to a variety of attacks that could, for example, compromise the sensitive keys stored on the device. In this paper, we set out a formal model of the operation of the API, which differs from previous security API models notably in that it accounts for non-monoton...
متن کاملStéphanie Delaune An Undecidability Result for AGh
We present an undecidability result for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, several recent works relax this assumption, allowing the intruder to exploit these properties. We are interested in the Abelian groups theory in combination with the homomorphism axiom. We show th...
متن کاملResults on the case studies
The results presented in this report is a summary of all the experiments that have been performed during the project on the case studies presented in [15].
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008