Handling Algebraic Properties in Automatic Analysis of Security Protocols

Yohan Boichut 1 Pierre-Cyrille Héam 1 Olga Kouchnarenko 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), INRIA Lorraine, LORIA - Laboratoire Lorrain de Recherche en Informatique et ses Applications
Abstract : This paper extends the approximation-based theoretical framework in which the security problem -- secrecy preservation against an intruder -- may be semi-decided through a reachability verification. We explain how to cope with algebraic properties for an automatic approximation-based analysis of security protocols. We prove that if the initial knowledge of the intruder is a regular tree language, then the security problem may by semi-decided for protocols using cryptographic primitives with algebraic properties. More precisely, an automatically generated approximation function enables us 1) an automatic normalization of transitions, and 2) an automatic completion procedure. The main advantage of our approach is that the approximation function makes it possible to verify security protocols with an arbitrary number of sessions. The concepts are illustrated on an example of the view-only protocol using a cryptographic primitive with the exclusive or algebraic property.
Document type :
Conference papers
Complete list of metadatas

https://hal.archives-ouvertes.fr/hal-00463424
Contributor : Yohan Boichut <>
Submitted on : Friday, March 12, 2010 - 10:35:55 AM
Last modification on : Friday, July 6, 2018 - 3:06:10 PM

Identifiers

  • HAL Id : hal-00463424, version 1

Citation

Yohan Boichut, Pierre-Cyrille Héam, Olga Kouchnarenko. Handling Algebraic Properties in Automatic Analysis of Security Protocols. ICTAC'2006, Nov 2006, Tunis, Tunisia. pp.153-167. ⟨hal-00463424⟩

Share

Metrics

Record views

235