Computing knowledge in security protocols under convergent equational theories - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Article Dans Une Revue Journal of Automated Reasoning Année : 2012

Computing knowledge in security protocols under convergent equational theories

Résumé

The analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modeled by a term algebra equipped with an equational theory axiomatizing the properties of the cryptographic primitives (e.g. encryption, signature). In this context, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems.\par We propose a procedure for both problems under arbitrary convergent equational theories. Since the underlying problems are undecidable we cannot guarantee termination. Nevertheless, our procedure terminates on a wide range of equational theories. In particular, we obtain a new decidability result for a theory we encountered when studying electronic voting protocols. We also provide a prototype implementation.
Fichier principal
Vignette du fichier
CDK-jar10.pdf (420.77 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00636794 , version 1 (07-10-2015)

Identifiants

Citer

Stefan Ciobaca, Stéphanie Delaune, Steve Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 2012, 48 (2), pp.219-262. ⟨10.1007/s10817-010-9197-7⟩. ⟨inria-00636794⟩
192 Consultations
87 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More