Deciding key cycles for security protocols

被引:11
|
作者
Cortier, Veronique [1 ]
Zalinescu, Eugen [1 ]
机构
[1] CNRS, INRIA Lorraine projet Cassis, UMR 7503, Loria, F-75700 Paris, France
关键词
D O I
10.1007/11916277_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptography. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. {k}(k)) can be produced during the execution of protocols. While security properties like secrecy or authentication have been proved decidable for many interesting classes of protocols, the automatic detection of key cycles has not been studied so far. In this paper, we prove that deciding the existence of key-cycles is NP-complete for a bounded number of sessions. Next, we observe that the techniques that we use are of more general interest and apply them to reprove the decidability of a significant existing fragment of protocols with timestamps.
引用
收藏
页码:317 / +
页数:3
相关论文
共 50 条
  • [41] SECURITY IN QUANTUM COMPUTING USING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Kartheek, D. N.
    Amarnath, G.
    Reddy, P. Venkateswarlu
    [J]. 2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 19 - 24
  • [42] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314
  • [43] Questioning the Security of Three Recent Authentication and Key Agreement Protocols
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Rashidi, Shima
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Hosseinzadeh, Mehdi
    [J]. IEEE ACCESS, 2021, 9 : 98204 - 98217
  • [44] On the security of Girault key agreement protocols against active attacks
    Oh, SH
    Mambo, M
    Shizuya, H
    Won, DH
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
  • [45] ON THE (IN)SECURITY OF GROUP KEY TRANSFER PROTOCOLS BASED ON SECRET SHARING
    Olimid, Ruxandra F.
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 : 378 - 387
  • [46] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [47] Separations in circular security for arbitrary length key cycles, revisited
    Chang, Jinyong
    Dai, Honglong
    Xu, Maozhi
    Xue, Rui
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5392 - 5400
  • [48] Security model and modular design of fair authentication key exchange protocols
    DengGuo Feng
    WeiDong Chen
    [J]. Science China Information Sciences, 2010, 53 : 278 - 287
  • [49] Security of device-independent quantum key distribution protocols: a review
    Primaatmaja, Ignatius W.
    Goh, Koon Tong
    Tan, Ernest Y. -Z.
    Khoo, John T. -F.
    Ghorai, Shouvik
    Lim, Charles
    [J]. QUANTUM, 2023, 7
  • [50] Security model and modular design of fair authentication key exchange protocols
    FENG DengGuo & CHEN WeiDong State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2010, 53 (02) : 278 - 287