Skip to main content

On the Reachability Problem in Cryptographic Protocols

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1877))

Abstract

We study the verification of secrecy and authenticity properties for cryptographic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with an adversary. Assuming finite principals, we present a decision procedure for the reachability problem which is based on a ‘symbolic’ reduction system.

A full version of this paper is available as INRIA Research Report 3915, March 2000. The first author is a member of Action INRIA ‘MIMOSA’ and he is partially supported by WG-CONFER and RNRT-Marvel.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. In Proc. ACM Computer and Comm. Security, 1997.

    Google Scholar 

  2. R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Proc. ASIAN99, SLNCS 1742, pages 15–26, 1999.

    Google Scholar 

  3. M. Boreale, R. De Nicola, and R. Pugliese. Proof techniques for cryptographic processes. In Proc. IEEE Logic in Comp. Sci., 1999.

    Google Scholar 

  4. D. Bolignano. Formal verification of cryptographic protocols. In Proc. ACM Conference on Computer Communication and Security, 1996.

    Google Scholar 

  5. M. Boreale. Symbolic analysis of cryptographic protocols in the spi-calculus. Personal communication, 2000.

    Google Scholar 

  6. H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. Draft available at http://www.grappa.univ-lille3.fr/tata.

  7. J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, 1997. Available at http://www.cs.york.ac.uk/ ~jac/papers/drareview.ps.gz.

  8. E. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In Proc. IFIP Conf. on Progr. Concepts and Methods (PROCOMET), 1998.

    Google Scholar 

  9. N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.

    Google Scholar 

  10. D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198–208, 1983.

    Article  MATH  MathSciNet  Google Scholar 

  11. A. Huima. Efficient infinite-state analysis of security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.

    Google Scholar 

  12. G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol Using FDR. In Proc. TACAS, SLNCS, 1996.

    Google Scholar 

  13. C. Meadows. A model of computation for the nrl protocol analyzer. In Proc. IEEE Computer Security Foundations Workshop, 1994.

    Google Scholar 

  14. J. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murø. In Proc. IEEE Symp. on Security and Privacy, 1997.

    Google Scholar 

  15. D. Monniaux. Abstracting cryptographic protocols with tree automata. In Proc. Static Analysis Symp., SLNCS, 1999.

    Google Scholar 

  16. L. Paulson. Proving properties of security protocols by induction. In Proc. IEEE Computer Security Foundations Workshop, 1997.

    Google Scholar 

  17. L. Paulson. Proving security protocols correct. In Proc. IEEE Logic in Comp. Sci., 1999.

    Google Scholar 

  18. S. Schneider. Security properties and CSP. In Proc. IEEE Symp. Security and Privacy, 1996.

    Google Scholar 

  19. C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In Proc. CADE 99. SLNCS 1632, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Amadio, R.M., Lugiez, D. (2000). On the Reachability Problem in Cryptographic Protocols. In: Palamidessi, C. (eds) CONCUR 2000 — Concurrency Theory. CONCUR 2000. Lecture Notes in Computer Science, vol 1877. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44618-4_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-44618-4_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67897-7

  • Online ISBN: 978-3-540-44618-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics