Exploiting symmetries when proving equivalence properties for security protocols (Technical report) - Archive ouverte HAL Accéder directement au contenu
Rapport (Rapport Technique) Année : 2020

Exploiting symmetries when proving equivalence properties for security protocols (Technical report)

Vincent Cheval
Steve Kremer

Résumé

Verification of privacy-type properties for cryptographic protocols in an active adversarial environment, modelled as a behavioural equivalence in concurrent-process calculi, exhibits a high computational complexity. While undecidable in general, for some classes of common cryptographic primitives the problem is coNEXP-complete when the number of honest participants is bounded. In this paper we develop optimisation techniques for verifying equivalences, exploiting symmetries between the two processes under study. We demonstrate that they provide a signi cant (sev-eral orders of magnitude) speed-up in practice, thus increasing the size of the protocols that can be analysed fully automatically.
Fichier principal
Vignette du fichier
main.pdf (867.7 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02267866 , version 1 (19-08-2019)
hal-02267866 , version 2 (27-08-2019)
hal-02267866 , version 3 (17-04-2020)

Identifiants

  • HAL Id : hal-02267866 , version 3

Citer

Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. Exploiting symmetries when proving equivalence properties for security protocols (Technical report). [Technical Report] INRIA Nancy Grand-Est. 2020. ⟨hal-02267866v3⟩
139 Consultations
205 Téléchargements

Partager

Gmail Facebook X LinkedIn More