2008
DOI: 10.1016/j.ic.2007.07.005
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic protocol analysis for monoidal equational theories

Abstract: We consider the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved in the protocol. This leads to a more realistic model than what we get under the perfect cryptography assumption, but it implies that protocol analysis deals with terms modulo some equational theory instead of terms in a free algebra. The main goal of this paper is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

3
17
0

Year Published

2009
2009
2010
2010

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 37 publications
3
17
0
Order By: Relevance
“…In particular, Delaune, et. al., [16] obtain results similar to what we have here concerning combination of AC theories. One difference between these works and ours is in how this combination is derived.…”
Section: Conclusion and Related Worksupporting
confidence: 89%
See 1 more Smart Citation
“…In particular, Delaune, et. al., [16] obtain results similar to what we have here concerning combination of AC theories. One difference between these works and ours is in how this combination is derived.…”
Section: Conclusion and Related Worksupporting
confidence: 89%
“…A drawback for the approach with explicit destructors is that one needs to consider these destructors together with other algebraic properties in proving decidability, although recent work in combining decidable theories [3] allows one to deal with them modularly. Combination of intruder theories has been considered in [9,3,16], as part of their solution to a more difficult problem of deducibility constraints which assumes active intruders. In particular, Delaune, et.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Note however that [2] also considers equivalence properties, that are not covered (yet) by our work. There are also several examples of formal (intruder) proof systems that yield decidable deducibility constraints [16,8,6,5,10]. All these works consider AC-symbols and are incomparable with our results.…”
mentioning
confidence: 59%
“…There are also a number of results for classes of theories, for instance: subterm theories [11] and monoidal theories [37]. This does not cover however some relevant examples such as the one described in [19].…”
Section: Bounded Number Of Sessionsmentioning
confidence: 99%
“…[37]): if there is an attack then there is an attack, which is built, stacking pieces of protocol rules. Then, the search space for σ becomes finite, yielding decision algorithms.…”
Section: Bounded Number Of Sessionsmentioning
confidence: 99%