A Decision Procedure for the Verification of Security Protocols with Explicit Destructors - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2004

A Decision Procedure for the Verification of Security Protocols with Explicit Destructors

Résumé

We present a non-deterministic polynomial time procedure to decide the problem of insecurity, in the presence of a bounded number of sessions, for cryptographic protocols containing explicit destructor symbols, like decryption and projection. These operators are axiomatized by an arbitrary convergent rewrite system satisfying some syntactic restrictions. This approach, with parameterized semantics, allows us to weaken the security hypotheses for verification, i.e. to address a larger class of attacks than for models based on free algebra. Our procedure is defined by an inference system based on basic narrowing techniques for deciding satisfiability of combinations of first-order equations and intruder deduction constraints.
Fichier principal
Vignette du fichier
DJ-ccs-2004.pdf (247.85 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00579012 , version 1 (22-03-2011)

Identifiants

  • HAL Id : inria-00579012 , version 1

Citer

Stéphanie Delaune, Florent Jacquemard. A Decision Procedure for the Verification of Security Protocols with Explicit Destructors. 11th ACM Conference on Computer and Communications Security (CCS), Oct 2004, Washington D.C., United States. pp.278-287. ⟨inria-00579012⟩
69 Consultations
120 Téléchargements

Partager

Gmail Facebook X LinkedIn More