Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives

被引:1
|
作者
Boichut, Yohan [1 ]
Heam, Pierre-Cyrille [2 ]
Kouchnarenko, Olga [3 ]
机构
[1] Univ Orleans, Lab Informat Fondamentale Orleans, Orleans, France
[2] ENS Cachan, CNRS, INRIA, LSV, Cachan, France
[3] CASSIS, INRIA, LIFC, Besancon, France
关键词
Security protocol; algebraic properties; automatic approximation;
D O I
10.1016/j.entcs.2009.05.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper extends a rewriting approximations-based theoretical framework in which the security problem - secrecy preservation against an active intruder - may be semi-decided through a reachability analysis. In a recent paper, we have shown how to semi-decide whether a security protocol using algebraic properties of cryptographic primitives is safe. In this paper, we investigate the dual - insecurity - problem: we explain how to semi-decide whether a protocol using cryptographic primitive algebraic properties is unsafe. This improvement offers us to draw automatically a complete diagnostic of a security protocol with an unbounded number of sessions. Furthermore, our approach is supported by the tool TA4SP successfully applied for analysing the NSPK-xor protocol and the Diffie-Hellman protocol.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [1] Abstracting cryptographic protocols with tree automata
    Monniaux, D
    STATIC ANALYSIS, 1999, 1694 : 149 - 163
  • [2] Abstracting cryptographic protocols with tree automata
    Monniaux, D
    SCIENCE OF COMPUTER PROGRAMMING, 2003, 47 (2-3) : 177 - 202
  • [3] Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
    Li, Chaoyun
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 171 - 193
  • [4] Tree automata with one memory set constraints and cryptographic protocols
    Comon, H
    Cortier, W
    THEORETICAL COMPUTER SCIENCE, 2005, 331 (01) : 143 - 214
  • [5] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [6] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [7] An algebraic approach to symmetric linear layers in cryptographic primitives
    Subroto, Robert Christian
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2023, 15 (06): : 1053 - 1067
  • [8] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols
    Camenisch, Jan
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
  • [9] An approach to finding the attacks on the cryptographic protocols
    Sun, Yongxing
    Wang, Xinmei
    Operating Systems Review (ACM), 2000, 34 (03): : 19 - 28
  • [10] Reconstruction of attacks against cryptographic protocols
    Allamigeon, X
    Blanchet, B
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154