首页> 外文期刊>Theoretical computer science >Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
【24h】

Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures

机译:不相交的入侵者理论的结合中的符号协议分析:组合决策程序

获取原文
获取原文并翻译 | 示例
           

摘要

Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples of such sets of operators comprise XOR, multiplication, abstract encryption/decryption. In this report we give an algorithm for combining decision procedures for arbitrary intruder theories with disjoint sets of operators, provided that solvability of ordered intruder constraints, a slight generalization of intruder constraints, can be decided in each theory. This is the case for most of the intruder theories for which a decision procedure has been given. In particular our result allows us to decide trace-based security properties of protocols that employ any combination of the above mentioned operators with a bounded number of sessions.
机译:用于协议符号分析的大多数决策程序仅限于与固定入侵者理论相关的固定代数运算符集。这种运算符集的示例包括XOR,乘法,抽象加密/解密。在本报告中,我们提供了一种算法,该算法可以将任意入侵者理论的决策程序与运算符的不相交集组合在一起,但前提是可以在每种理论中确定有序入侵者约束的可求解性,入侵者约束的一般性。对于大多数已经给出了决策程序的入侵者理论,情况就是如此。尤其是,我们的结果使我们能够确定协议的基于跟踪的安全性,该协议使用上述运算符的任意组合与有限数量的会话。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号