Active Intruders with Caps - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Active Intruders with Caps

Résumé

We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. By modeling each protocol step as a rigid Horn clause, and the intruder abilities as an equational theory over a convergent rewrite system, the problem of active intrusion is formulated as a Cap Unification problem. Cap Unification is an extension of Equational Unification: we look for a cap to be placed on a given set of terms, so that it unifies with a given term modulo the equational theory.
Fichier non déposé

Dates et versions

inria-00330532 , version 1 (14-10-2008)

Identifiants

  • HAL Id : inria-00330532 , version 1

Citer

Siva Anatharaman, Hai Lin, Chris Lynch, Paliath Narendran, Michael Rusinowitch. Active Intruders with Caps. FCS-ARSPA-WITS'08, Jun 2008, Pittsburgh, United States. ⟨inria-00330532⟩
122 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More