Deciding security for protocols with recursive tests
Deciding security for protocols with recursive tests. Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. In Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), pp. 49–63, Lecture Notes in Artificial Intelligence, Springer, Wrocław, Poland, July 2011.
Download
Abstract
Security protocols aim at securing communications
over public networks. Their design is notoriously
dicult and error-prone. Formal methods have shown
their usefulness for providing a careful security
analysis in the case of standard authentication and
condentiality protocols. However, most current
techniques do not apply to protocols that perform
recursive computation e.g. on a list of messages
received from the network.
While considering
general recursive input\slashoutput actions very
quickly yields undecidability, we focus on protocols
that perform recursive tests on received messages but
output messages that depend on the inputs in a
standard way. This is in particular the case of
secured routing protocols, distributed right
delegation or PKI certication paths. We provide
NPTIME decision procedures for protocols with
recursive tests and for a bounded number of sessions.
We also revisit constraint system solving, providing
a complete symbolic representation of the attacker
knowledge.
BibTeX
@inproceedings{ACD-cade11,
address = {Wroc{\l}aw, Poland},
author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and
Delaune, St{\'e}phanie},
booktitle = {{P}roceedings of the 23rd {I}nternational
{C}onference on {A}utomated {D}eduction ({CADE}'11)},
editor = {Bj{\o}rner, Nikolaj and
Sofronie-Stokkermans, Viorica},
month = jul,
pages = {49-63},
publisher = {Springer},
series = {Lecture Notes in Artificial Intelligence},
title = {Deciding security for protocols with recursive tests},
year = {2011},
abstract = {Security protocols aim at securing communications
over public networks. Their design is notoriously
dicult and error-prone. Formal methods have shown
their usefulness for providing a careful security
analysis in the case of standard authentication and
condentiality protocols. However, most current
techniques do not apply to protocols that perform
recursive computation e.g. on a list of messages
received from the network.\par While considering
general recursive input{\slash}output actions very
quickly yields undecidability, we focus on protocols
that perform recursive tests on received messages but
output messages that depend on the inputs in a
standard way. This is in particular the case of
secured routing protocols, distributed right
delegation or PKI certication paths. We provide
NPTIME decision procedures for protocols with
recursive tests and for a bounded number of sessions.
We also revisit constraint system solving, providing
a complete symbolic representation of the attacker
knowledge.},
doi = {10.1007/978-3-642-22438-6_6},
}