Sound approximations to Diffle-Hellman using rewrite rules

被引:0
作者
Lynch, C [1 ]
Meadows, C
机构
[1] Clarkson Univ, Dept Math & Comp Sci, Potsdam, NY 13699 USA
[2] USN, Res Lab, Ctr High Assurance Comp Syst, Washington, DC 20375 USA
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2004年 / 3269卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The commutative property of exponentiation that is necessary to model the Diffie-Hellman key exchange can lead to inefficiency when reasoning about protocols that make use of that cryptographic construct. In this paper we discuss the feasibility of approximating the commutative rule for exponentiation with a pair of rewrite rules, for which in unification-based systems, the complexity of the unification algorithm changes from at best exponential to at worst quadratic in the number of variables. We also derive and prove conditions under which the approximate model is sound with respect to the original model. Since the conditions make the protocol easier to reason about and less prone to error, they often turn out to be in line with generally accepted principles for sound protocol design.
引用
收藏
页码:262 / 277
页数:16
相关论文
共 15 条
[1]  
[Anonymous], 2003, P 10 ACM C COMP COMM
[2]  
Blanchet B., 2001, 14 IEEE CSFW
[3]  
CERVESATO I, 2000, P 13 IEEE CSFW
[4]  
CERVESATO I, 2000, 1 WORKSH ISS THEOR S
[5]   Strand spaces: Why is a security protocol correct? [J].
Fabrega, FJT ;
Herzog, JC ;
Guttman, JD .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :160-171
[6]  
HEATHER J, 2000, P 13 CSFW
[7]  
HERZOG J, 2003, P 16 IEEE CSFW
[8]  
KAUFMAN C, 2004, INTERNET KEY EXCHANG
[9]  
Lynch C., 2002, Automated Deduction - CADE-18. 18th International Conference on Automated Deduction. Proceedings (Lecture Notes in Artificial Intelligence Vol.2392), P471
[10]  
LYNCH C, 2004, IN PRESS WITS 04