Computing Knowledge in Security Protocols Under Convergent Equational Theories

被引:13
作者
Ciobaca, Stefan [1 ,2 ,3 ]
Delaune, Stephanie [1 ,2 ,3 ]
Kremer, Steve [1 ,2 ,3 ]
机构
[1] ENS Cachan, LSV, F-94230 Cachan, France
[2] CNRS, F-94230 Cachan, France
[3] INRIA Saclay Ile de France, F-94230 Cachan, France
关键词
Formal methods; Security protocols; Static equivalence; TOOL;
D O I
10.1007/s10817-010-9197-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modelled by a term algebra equipped with an equational theory axiomatising the properties of the cryptographic primitives ( e. g. encryption, signature). In this context, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We propose a procedure for both problems under arbitrary convergent equational theories. Since the underlying problems are undecidable we cannot guarantee termination. Nevertheless, our procedure terminates on a wide range of equational theories. In particular, we obtain a new decidability result for a theory we encountered when studying electronic voting protocols. We also provide a prototype implementation.
引用
收藏
页码:219 / 262
页数:44
相关论文
共 26 条
[1]  
ABADI M, 2001, P 28 ACM S PRINC PRO
[2]   Deciding knowledge in security protocols under equational theories [J].
Abadi, Martin ;
Cortier, Veronique .
THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) :2-32
[3]  
Anantharaman S., 2007, LNCS, V4533
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]  
Arnaud M, 2007, LECT NOTES ARTIF INT, V4720, P103
[6]  
Backes M., 2008, P IEEE S SEC PRIV S
[7]  
BACKES M, 2008, P 21 IEEE COMP SEC F
[8]  
Baudet M., 2008, YAPA YET ANOTHER PRO
[9]  
Baudet M., 2005, 12 ACM C COMP COMM S
[10]  
Baudet M, 2009, LECT NOTES COMPUT SC, V5595, P148, DOI 10.1007/978-3-642-02348-4_11