Deciding key cycles for security protocols

被引:11
|
作者
Cortier, Veronique [1 ]
Zalinescu, Eugen [1 ]
机构
[1] CNRS, INRIA Lorraine projet Cassis, UMR 7503, Loria, F-75700 Paris, France
关键词
D O I
10.1007/11916277_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptography. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. {k}(k)) can be produced during the execution of protocols. While security properties like secrecy or authentication have been proved decidable for many interesting classes of protocols, the automatic detection of key cycles has not been studied so far. In this paper, we prove that deciding the existence of key-cycles is NP-complete for a bounded number of sessions. Next, we observe that the techniques that we use are of more general interest and apply them to reprove the decidability of a significant existing fragment of protocols with timestamps.
引用
收藏
页码:317 / +
页数:3
相关论文
共 50 条
  • [1] Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles
    Comon-Lundh, Hubert
    Cortier, Veronique
    Zalinescu, Eugen
    [J]. ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2010, 11 (02)
  • [2] Deciding the Security of Protocols with Commuting Public Key Encryption
    Chevalier, Yannick
    Kuesters, Ralf K.
    Rusinowitch, Michael
    Turuani, Mathieu
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 55 - 66
  • [3] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103
  • [4] Deciding Security for Protocols with Recursive Tests
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    [J]. AUTOMATED DEDUCTION - CADA-23, 2011, 6803 : 49 - +
  • [5] Combining algorithms for deciding knowledge in security protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    [J]. FRONTIERS OF COMBINING SYSTEMS, PROCEEDINGS, 2007, 4720 : 103 - +
  • [6] Deciding knowledge in security protocols under equational theories
    Abadi, Martin
    Cortier, Veronique
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 2 - 32
  • [7] Deciding knowledge in security protocols under equational theories
    Abadi, M
    Cortier, V
    [J]. AUTOMATA , LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2004, 3142 : 46 - 58
  • [8] Deciding knowledge in security protocols for monoidal equational theories
    Cortier, Veronique
    Delaune, Stephanie
    [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2007, 4790 : 196 - +
  • [9] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [10] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546