Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives

被引:1
|
作者
Boichut, Yohan [1 ]
Heam, Pierre-Cyrille [2 ]
Kouchnarenko, Olga [3 ]
机构
[1] Univ Orleans, Lab Informat Fondamentale Orleans, Orleans, France
[2] ENS Cachan, CNRS, INRIA, LSV, Cachan, France
[3] CASSIS, INRIA, LIFC, Besancon, France
关键词
Security protocol; algebraic properties; automatic approximation;
D O I
10.1016/j.entcs.2009.05.030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper extends a rewriting approximations-based theoretical framework in which the security problem - secrecy preservation against an active intruder - may be semi-decided through a reachability analysis. In a recent paper, we have shown how to semi-decide whether a security protocol using algebraic properties of cryptographic primitives is safe. In this paper, we investigate the dual - insecurity - problem: we explain how to semi-decide whether a protocol using cryptographic primitive algebraic properties is unsafe. This improvement offers us to draw automatically a complete diagnostic of a security protocol with an unbounded number of sessions. Furthermore, our approach is supported by the tool TA4SP successfully applied for analysing the NSPK-xor protocol and the Diffie-Hellman protocol.
引用
收藏
页码:57 / 72
页数:16
相关论文
共 50 条
  • [11] Investigating four neighbourhood cellular automata as better cryptographic primitives
    Jose J.
    Chowdhury D.R.
    Jose, Jimmy (jimmy@cse.iitkgp.ernet.in), 1675, Taru Publications (20): : 1675 - 1695
  • [12] FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives
    Swierczynski, Pawel
    Fyrbiak, Marc
    Koppe, Philipp
    Paar, Christof
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1236 - 1249
  • [13] Algebraic Attacks on RFID Protocols
    van Deursen, Ton
    Radomirovic, Sasa
    INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51
  • [14] Pushdown tree automata, algebraic tree systems, and algebraic tree series
    Kuich, W
    INFORMATION AND COMPUTATION, 2001, 165 (01) : 69 - 99
  • [15] Combining cryptographic primitives to prevent jamming attacks in wireless networks
    Singh, Ngangbam Herojit
    Kayalvizhi, A.
    2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, 2013, : 251 - 255
  • [16] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [17] A survey of algebraic properties used in cryptographic protocols
    Cortier, Veronique
    Delaune, Stephanie
    Lafourcade, Pascal
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (01) : 1 - 43
  • [18] Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
    Singh, Ngangbam Herojit
    Kayalvizhi, A.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 251 - 255
  • [19] Modeling Cryptographic Protocols Using the Algebraic Processor
    Frolov, A. B.
    Vinnikov, A. M.
    2018 IV INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGIES IN ENGINEERING EDUCATION (INFORINO), 2018,
  • [20] Quantum Communication Attacks on Classical Cryptographic Protocols
    Damgard, Ivan
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181