Deciding security properties for cryptographic protocols. Application to key cycles
Deciding security properties for cryptographic protocols. Application to key cycles. Hubert Comon-Lundh, Véronique Cortier, and Eugen Zălinescu. ACM Transactions on Computational Logic, 11(2), ACM Press, January 2010.
Download
Abstract
There is a large amount of work dedicated to the
formal verification of security protocols. In this
paper, we revisit and extend the NP-complete decision
procedure for a bounded number of sessions. We use a,
now standard, deducibility constraint formalism for
modeling security protocols. Our first contribution
is to give a simple set of constraint simplification
rules, that allows to reduce any deducibility
constraint to a set of solved forms, representing all
solutions (within the bound on sessions).
As a
consequence, we prove that deciding the existence of
key cycles is NP-complete for a bounded number of
sessions. The problem of key-cycles has been put
forward by recent works relating computational and
symbolic models. The so-called soundness of the
symbolic model requires indeed that no key cycle
(e.g., enc\((k, k)\)) ever occurs in the
execution of the protocol. Otherwise, stronger
security assumptions (such as KDM-security) are
required.
We show that our decision procedure can
also be applied to prove again the decidability of
authentication-like properties and the decidability
of a significant fragment of protocols with
timestamps.
BibTeX
@article{CCLZ-TOCL,
author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and
Z{\u{a}}linescu, Eugen},
journal = {ACM Transactions on Computational Logic},
month = jan,
number = {2},
publisher = {ACM Press},
title = {Deciding security properties for cryptographic
protocols. Application to key cycles},
volume = {11},
year = {2010},
abstract = {There is a large amount of work dedicated to the
formal verification of security protocols. In~this
paper, we~revisit and extend the NP-complete decision
procedure for a bounded number of sessions. We use a,
now standard, deducibility constraint formalism for
modeling security protocols. Our~first contribution
is to give a simple set of constraint simplification
rules, that allows to reduce any deducibility
constraint to a set of solved forms, representing all
solutions (within the bound on sessions).\par As a
consequence, we prove that deciding the existence of
key cycles is NP-complete for a bounded number of
sessions. The problem of key-cycles has been put
forward by recent works relating computational and
symbolic models. The so-called soundness of the
symbolic model requires indeed that no key cycle
(\textit{e.g.},~enc\((k, k)\)) ever occurs in the
execution of the protocol. Otherwise, stronger
security assumptions (such as KDM-security) are
required.\par We show that our decision procedure can
also be applied to prove again the decidability of
authentication-like properties and the decidability
of a significant fragment of protocols with
timestamps.},
doi = {10.1145/1656242.1656244},
}