DocumentCode :
1616083
Title :
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
Author :
Comon-Lundh, H. ; Shmatikov, V.
Author_Institution :
LSV, INRIA, Cachan, France
fYear :
2003
Firstpage :
271
Lastpage :
280
Abstract :
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties such as xor, we extend the conventional Dolev-Yao model by permitting the intruder to exploit these properties. We show that the ground reachability problem in NP for the extended intruder theories in the cases of xor and Abelian groups. This result follows from a normal proof theorem. Then, we show how to lift this result in the xor case: we consider a symbolic constraint system expressing the reachability (e.g., secrecy) problem for a finite number of sessions. We prove that such a constraint system is decidable, relying in particular on an extension of combination algorithms for unification procedures. As a corollary, this enables automatic symbolic verification of cryptographic protocols employing xor for a fixed number of sessions.
Keywords :
cryptography; decidability; formal verification; protocols; reachability analysis; theorem proving; Abelian group; Dolev-Yao model; algebraic property; combination algorithm; constraint solving; cryptographic protocol; equational theory; exclusive or; insecurity decision; intruder deduction; normal proof theorem; xor; Algebra; Authentication; Computer science; Constraint theory; Context modeling; Cryptographic protocols; Cryptography; Equations; Logic; Polynomials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Logic in Computer Science, 2003. Proceedings. 18th Annual IEEE Symposium on
ISSN :
1043-6871
Print_ISBN :
0-7695-1884-2
Type :
conf
DOI :
10.1109/LICS.2003.1210067
Filename :
1210067
Link To Document :
بازگشت