Timed protocol insecurity problem is NP-complete

被引:0
作者
Benerecetti, Massimo [1 ,2 ,3 ]
Peron, Adriano [3 ]
机构
[1] Univ Naples Federico II, Fac Sci Matemat Fis & Nat, Naples, Italy
[2] Univ Naples Federico II, Dipartimento Sci Fis, Naples, Italy
[3] Univ Naples Federico II, Dipartimento Fis, Naples, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 03期
关键词
Security protocols; Real-time models; Computational complexity;
D O I
10.1016/j.future.2011.11.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we study the protocol insecurity problem for time-dependent security protocols under the finite number of sessions' assumption, extending to the timed case, previous results obtained for the same problem in the untimed case. In particular, we propose a timed specification language, which allows to model temporal features typically involved in the implementation of security protocols. We introduce a stronger version of the Dolev-Yao intruder, by allowing it to generate new timestamps which can affect the execution of a protocol sensitive to their temporal validity. We prove that this temporal extension together with the increased power of the intruder model do not affect the complexity of the protocol insecurity problem, which remains NP-complete as in the untimed case. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:843 / 862
页数:20
相关论文
共 24 条
[1]  
[Anonymous], ELECT NOTES THEORETI
[2]   SAT-based model-checking for security protocols analysis [J].
Armando, Alessandro ;
Compagna, Luca .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (01) :3-32
[3]  
Armando Alessandro, 2005, COMPUTER AIDED VERIF, P1
[4]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[5]  
Benerecetti M., 2010, P INT C HIGH PERF CO
[6]  
Benerecetti M., 2006, P FCS ARSPA 06 SEATT, P15
[7]  
Benerecetti M, 2009, J COMPUT, V4, P366, DOI 10.4304/jcp.4.5.366-377
[8]  
Benerecetti Massimo, 2009, INT J COMPUTERS APPL, V31
[9]  
Burrows M., 1989, TECHNICAL REPORT
[10]   Timed analysis of security protocols [J].
Corin, R. ;
Etalle, S. ;
Hartel, P. ;
Mader, A. .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) :619-645