A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties

被引:2
|
作者
Cortier, Veronique [1 ,2 ,3 ]
Delaune, Stephanie [4 ,5 ]
Sundararajan, Vaishnavi [4 ,5 ]
机构
[1] CNRS, LORIA, Vandoeuvre Les Nancy, France
[2] Univ Lorraine, Vandoeuvre Les Nancy, France
[3] Inria Grand Est, Vandoeuvre Les Nancy, France
[4] CNRS, IRISA, Rennes, France
[5] Univ Rennes, Rennes, France
基金
欧洲研究理事会;
关键词
Security protocols; Verification; Privacy properties; TOOL;
D O I
10.1007/s10817-020-09582-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We identify a new decidable class of security protocols, both for reachability and equivalence properties. Our result holds for an unbounded number of sessions and for protocols with nonces. It covers all standard cryptographic primitives. Our class sets up three main assumptions. (i) Protocols need to be "simple", meaning that an attacker can precisely identify from which participant and which session a message originates from. We also consider protocols with no else branches (only positive test). (ii) Protocols should be type-compliant, which is intuitively guaranteed as soon as two encrypted messages of the protocol cannot be confused. (iii) Finally, we define the notion of a dependency graph, which, given a protocol, characterises how actions depend on the other ones (both sequential dependencies and data dependencies are taken into account). Whenever the graph is acyclic, then the protocol falls into our class. We show that many protocols of the literature belong to our decidable class, including for example some of the protocols embedded in the biometric passport.
引用
收藏
页码:479 / 520
页数:42
相关论文
共 13 条
  • [1] A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties
    Véronique Cortier
    Stéphanie Delaune
    Vaishnavi Sundararajan
    Journal of Automated Reasoning, 2021, 65 : 479 - 520
  • [2] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546
  • [3] Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches
    Gazeau, Ivan
    Kremer, Steve
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 1 - 20
  • [4] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Cheval, Vincent
    Ciobaca, Stefan
    Kremer, Steve
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2016, 17 (04)
  • [5] Exploiting Symmetries When Proving Equivalence Properties for Security Protocols
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 905 - 922
  • [6] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140
  • [7] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Ciobaca, Stefan
    Kremer, Steve
    PROGRAMMING LANGUAGES AND SYSTEMS, 2012, 7211 : 108 - 127
  • [8] Equivalence Properties by Typing in Cryptographic Branching Protocols
    Cortier, Veronique
    Grimm, Niklas
    Lallemand, Joseph
    Maffei, Matteo
    PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 160 - 187
  • [9] Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles
    Comon-Lundh, Hubert
    Cortier, Veronique
    Zalinescu, Eugen
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2010, 11 (02)
  • [10] Bounding messages for free in security protocols - extension to various security properties
    Arapinis, Myrto
    Duflot, Marie
    INFORMATION AND COMPUTATION, 2014, 239 : 182 - 215