2011
DOI: 10.1007/978-3-642-19751-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Decision Procedures for Message Deducibility and Static Equivalence

Abstract: Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time algorithms for deciding both problems under subterm convergent equational theories and under a theory representing symmetric encryption with the prefix property. For subterm convergent theories, polynomial-time algorithms for both problems are well-known. However, we achieve a significantly better asymptotic complexity than existing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10]. For active attackers, bounding the number of protocol sessions is often sufficient to obtain decidability [RT03] and is of practical interest: most real-life attacks indeed only require a small number of sessions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10]. For active attackers, bounding the number of protocol sessions is often sufficient to obtain decidability [RT03] and is of practical interest: most real-life attacks indeed only require a small number of sessions.…”
Section: Related Workmentioning
confidence: 99%
“…We note that in Equiv R,F , R and F are not part of the input and that all previously proposed procedures in [AC06,CDK12,CBC10] are actually exponential in R or F. Moreover, this definition does not allow to give a lower bound for the whole class of subterm convergent rewriting system (the lower bounds may be different for particular rewriting systems). We therefore define an alternate problem which takes R and F as additional inputs.…”
Section: Decision Problems For Equivalencesmentioning
confidence: 99%
“…[36,37,38]), and some of these procedures have even been implemented (e.g. KISS [39], YAPA [40], FAST [41]). These results cover a wide class of cryptographic primitives as long as they are modelled through convergent equational theories (i.e., theories in which equations can be oriented and form a convergent rewriting system).…”
Section: Assembling Terms Into Framesmentioning
confidence: 99%
“…Indeed, the algorithm for deciding static equivalence presented in [36] effectively computes equational verifiers as part of the decision procedure. Computing type verifiers is a less direct extension of existing algorithms.…”
Section: and There Are No P ∈ N * \ { } T T ∈ T T Such That These mentioning
confidence: 99%