首页> 外文期刊>ACM transactions on computational logic >Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles
【24h】

Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles

机译:确定加密协议的安全属性。应用于关键周期

获取原文
获取原文并翻译 | 示例

摘要

There is a large amount of work dedicated to the formal verification of security protocols. In this article, we revisit and extend the NP-complete decision procedure for a bounded number of sessions. We use a, now standard, deducibility constraint formalism for modeling security protocols. Our first contribution is to give a simple set of constraint simplification rules, that allows to reduce any deducibility constraint to a set of solved forms, representing all solutions (within the bound on sessions).rnAs a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. The problem of key-cycles has been put forward by recent works relating computational and symbolic models. The so-called soundness of the symbolic model requires indeed that no key cycle (e.g., enc(k, k)) ever occurs in the execution of the protocol. Otherwise, stronger security assumptions (such as KDM-security) are required.rnWe show that our decision procedure can also be applied to prove again the decidability of authentication-like properties and the decidability of a significant fragment of protocols with timestamps.
机译:有大量工作致力于安全协议的形式验证。在本文中,我们将重新讨论NP完成决策过程并将其扩展到一定数量的会话。我们使用一种现在标准的可演绎约束形式主义来对安全协议进行建模。我们的第一个贡献是给出一组简单的约束简化规则,该规则可将任何可推导性约束简化为一组求解形式,以表示所有解决方案(在会话范围内)。rn因此,我们证明了确定存在性对于有限数量的会话,关键周期是NP完整的。最近有关计算和符号模型的工作提出了密钥循环问题。实际上,所谓的符号模型的健全性要求在协议的执行中永远不会发生密钥周期(例如,enc(k,k))。否则,需要更强的安全性假设(例如KDM-security)。rn我们证明了我们的决策过程也可以用于再次证明类身份验证属性的可判定性以及带有时间戳的协议的重要片段的可判定性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号