Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/788023.789056guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or

Published: 22 June 2003 Publication History

Abstract

We present decidability results for the verification ofcryptographic protocols in the presence of equational theoriescorresponding to xorand Abelian groups. Since theperfect cryptography assumption is unrealistic for cryptographicprimitives with visible algebraic properties such asxor, we extend the conventional Dolev-Yao model by permittingthe intruder to exploit these properties. We showthat the ground reachability problem in NP for the extendedintruder theories in the cases of xor and Abelian groups.This result follows from a normal proof theorem. Then, weshow how to lift this result in the xorcase: we consider asymbolic constraint system expressing the reachability (e.g.,secrecy) problem for a finite number of sessions. We provethat such constraint system is decidable, relying in particularon an extension of combination algorithms for unificationprocedures. As a corollary, this enables automaticsymbolic verification of cryptographic protocols employingxorfor a fixed number of sessions.

Cited By

View all
  • (2019)Pure Sequent CalculiACM Transactions on Computational Logic10.1145/331950120:3(1-38)Online publication date: 31-May-2019
  • (2018)Symbolic Proofs for Lattice-Based CryptographyProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243825(538-555)Online publication date: 15-Oct-2018
  • (2017)Satisfiability of general intruder constraints with and without a set constructorJournal of Symbolic Computation10.1016/j.jsc.2016.07.00980:P1(27-61)Online publication date: 1-May-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
LICS '03: Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
June 2003
ISBN:0769518842

Publisher

IEEE Computer Society

United States

Publication History

Published: 22 June 2003

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Pure Sequent CalculiACM Transactions on Computational Logic10.1145/331950120:3(1-38)Online publication date: 31-May-2019
  • (2018)Symbolic Proofs for Lattice-Based CryptographyProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243825(538-555)Online publication date: 15-Oct-2018
  • (2017)Satisfiability of general intruder constraints with and without a set constructorJournal of Symbolic Computation10.1016/j.jsc.2016.07.00980:P1(27-61)Online publication date: 1-May-2017
  • (2016)Gen2satProceedings of the 8th International Joint Conference on Automated Reasoning - Volume 970610.1007/978-3-319-40229-1_33(487-495)Online publication date: 27-Jun-2016
  • (2013)YAPAACM Transactions on Computational Logic10.1145/2422085.242208914:1(1-32)Online publication date: 1-Feb-2013
  • (2012)Decidability and Combination Results for Two Notions of Knowledge in Security ProtocolsJournal of Automated Reasoning10.1007/s10817-010-9208-848:4(441-487)Online publication date: 1-Apr-2012
  • (2012)Security protocol verificationProceedings of the First international conference on Principles of Security and Trust10.1007/978-3-642-28641-4_2(3-29)Online publication date: 24-Mar-2012
  • (2012)Unification modulo chainingProceedings of the 6th international conference on Language and Automata Theory and Applications10.1007/978-3-642-28332-1_7(70-82)Online publication date: 5-Mar-2012
  • (2011)Protocol analysis in Maude-NPA using unification modulo homomorphic encryptionProceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming10.1145/2003476.2003488(65-76)Online publication date: 20-Jul-2011
  • (2011)Rethinking about guessing attacksProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966954(316-325)Online publication date: 22-Mar-2011
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media