2004
DOI: 10.3233/jcs-2004-12203
|View full text |Cite
|
Sign up to set email alerts
|

Multiset rewriting and the complexity of bounded security protocols

Abstract: We formalize the Dolev-Yao model of security protocols, using a notation based on multiset rewriting with existentials. The goals are to provide a simple formal notation for describing security protocols, to formalize the assumptions of the Dolev-Yao model using this notation, and to analyze the complexity of the secrecy problem under various restrictions. We prove that, even for the case where we restrict the size of messages and the depth of message encryption, the secrecy problem is undecidable for the case… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
309
1
2

Year Published

2005
2005
2018
2018

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 204 publications
(316 citation statements)
references
References 59 publications
4
309
1
2
Order By: Relevance
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10].…”
Section: Related Workmentioning
confidence: 99%
“…While many complexity results are known for trace properties [DLM04,RT03], the case of behavioural equivalences remains mostly open. When the attacker is an eavesdropper and cannot interact with the protocol, the indistinguishability problem-static equivalence-has been shown ptime for large classes of cryptographic primitives [AC06,CDK12,CBC10].…”
Section: Related Workmentioning
confidence: 99%
“…We discovered this attack as we were interpreting the specification documents of this protocol [25] in preparation for its formalization in MSR [9,31,32], the specification language for our analysis. We start with a detailed description of the attacker's actions in the AS exchange, the key to the attack.…”
Section: The Attackmentioning
confidence: 99%
“…This model assumes perfect cryptographic primitives and a nondeterministic intruder that has total control of the communication network and capacity to forge new messages. It is known that reachability is undecidable for cryptographic protocols in the general case [13], even when a bound is put on the size of messages [12]. Because of these negative results, from the point of view of verification, the best we can hope for is either to identify decidable sub-classes as in [3,24,21] or to develop correct but incomplete verification algorithms as in [22,17,15].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Comon, Cortier and Mitchell [7] extended this class allowing pairing and binary encryption while the use of nonces still cannot be expressed in their model. Reachability is decidable for the bounded number of sessions [3,24,21] or when nonce creation is not allowed and the size of messages is bounded [12]. These assumptions are rarely justified in practice.…”
Section: Introductionmentioning
confidence: 99%