HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Journal articles

Verification of Stateful Cryptographic Protocols with Exclusive OR

Abstract : In cryptographic protocols, in particular RFID protocols, exclusive-or (XOR) operations are common. Due to the inherent complexity of faithful models of XOR, there is only limited tool support for the verification of cryptographic protocols using XOR. In this paper, we improve the TAMARIN prover and its underlying theory to deal with an equational theory modeling XOR operations. The XOR theory can be combined with all equational theories previously supported, including user-defined equational theories. This makes TAMARIN the first verification tool for cryptographic protocols in the symbolic model to support simultaneously this large set of equational theories, protocols with global mutable state, an unbounded number of sessions, and complex security properties including observational equivalence. We demonstrate the effectiveness of our approach by analyzing several protocols that rely on XOR, in particular multiple RFID-protocols, where we can identify attacks as well as provide proofs.
Document type :
Journal articles
Complete list of metadata

Cited literature [63 references]  Display  Hide  Download

Contributor : Jannik Dreier Connect in order to contact the contributor
Submitted on : Tuesday, November 12, 2019 - 11:12:37 AM
Last modification on : Friday, February 4, 2022 - 3:32:52 AM
Long-term archiving on: : Thursday, February 13, 2020 - 2:08:53 PM


Files produced by the author(s)




Jannik Dreier, Lucca Hirschi, Saša Radomirović, Ralf Sasse. Verification of Stateful Cryptographic Protocols with Exclusive OR. Journal of Computer Security, IOS Press, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩. ⟨hal-02358878⟩



Record views


Files downloads