Proceedings of the 8th ACM Conference on Computer and Communications Security 2001
DOI: 10.1145/501983.502007
|View full text |Cite
|
Sign up to set email alerts
|

Constraint solving for bounded-process cryptographic protocol analysis

Abstract: The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
221
0
1

Year Published

2003
2003
2014
2014

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 221 publications
(224 citation statements)
references
References 13 publications
2
221
0
1
Order By: Relevance
“…For instance both protocols, intruder capabilities and security properties can be formalized within first-order logic and dedicated resolution strategies yield relevant verification methods [18,21,6]. Another approach, initiated in [19], consists in symbolically representing the traces using deducibility constraints. Both approaches were quite successful in finding attacks/proving security protocols.…”
Section: Introductionmentioning
confidence: 99%
“…For instance both protocols, intruder capabilities and security properties can be formalized within first-order logic and dedicated resolution strategies yield relevant verification methods [18,21,6]. Another approach, initiated in [19], consists in symbolically representing the traces using deducibility constraints. Both approaches were quite successful in finding attacks/proving security protocols.…”
Section: Introductionmentioning
confidence: 99%
“…[20,4]). Similarly, off-line guessing attacks coded as static equivalence between process states [5] can be decided using such symbolic executions, but this requires one to check the equivalence of constraint systems, rather than satisfiability.…”
Section: Introductionmentioning
confidence: 99%
“…a finite number of protocol sessions [2,5,18]. Among the different approaches the symbolic ones [16,10,4] are based on reducing the problem to constraint solving in a term algebra. This reduction has proved to be quite effective on standard benchmarks and also was able to discover new flaws on several protocols [4].…”
Section: Introductionmentioning
confidence: 99%