首页> 外文期刊>Journal of Automated Reasoning >Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks
【24h】

Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks

机译:具有概率加密的协议安全性针对脱机字典攻击的决策程序

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

We consider the problem of formal automatic verification of cryptographic protocols when some data, like poorly chosen passwords, can be guessed by dictionary attacks. First, we define a theory of these attacks and propose an inference system modeling the deduction capabilities of an intruder. This system extends a set of well-studied deduction rules for symmetric and public key encryption, often called Dolev-Yao rules, with the introduction of a probabilistic encryption operator and guessing abilities for the intruder. Then, we show that the intruder deduction problem in this extended model is decidable in PTIME. The proof is based on a locality lemma for our inference system. This first result yields to an NP decision procedure for the protocol insecurity problem in the presence of a passive intruder. In the active case, the same problem is proved to be NP-complete: we give a procedure for simultaneously solving symbolic constraints with variables that represent intruder deductions. We illustrate the procedure with examples of published protocols and compare our model to other recent formal definitions of dictionary attacks.
机译:当字典攻击可以猜出某些数据(例如密码选择不当)时,我们考虑了加密协议的正式自动验证问题。首先,我们定义这些攻击的理论,并提出一个推理系统,对入侵者的演绎能力进行建模。该系统通过引入概率加密运算符和入侵者的猜测能力,扩展了一套经过广泛研究的对称和公共密钥加密推论规则(通常称为Dolev-Yao规则)。然后,我们证明了在这种扩展模型中的入侵者推断问题可以在PTIME中确定。证明基于我们推理系统的局部性引理。该第一结果导致在存在被动入侵者的情况下针对协议不安全问题的NP决策程序。在活跃的情况下,同样的问题被证明是NP完全的:我们给出了一个程序,用于同时解决代表入侵者推论的变量的符号约束。我们以已发布协议的示例说明该过程,并将我们的模型与其他最近的字典攻击正式定义进行比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号