Publication | Closed Access
Computing symbolic models for verifying cryptographic protocols
86
Citations
18
References
2001
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityFinite ProcessVerificationComputer-aided VerificationCryptographic ProtocolFormal VerificationHardware SecuritySymbolic ModelsBounded SizeFormal TechniqueSecure ProtocolSecure Multi-party ComputationData PrivacyComputer ScienceData SecurityCryptographyAutomated ReasoningCryptographic ProtectionFormal MethodsInfinite-state Cryptographic Protocols
We consider the problem of automatically verifing infinite-state cryptographic protocols. Specifically, we present an algorithm that given a finite process describing a protocol in a hostile environment (trying to force the system into a "bad" state) computes a model of traces on which security properties can be checked. Because of unbounded inputs from the environment, even finite processes have an infinite set of traces: the main focus of our approach is the reduction of this infinite set to a finite set by a symbolic analysis of the knowledge of the environment. Our algorithm is sound (and we conjecture complete) for protocols with shared-key encryption-decryption that use arbitrary messages as keys; further it is complete in the common and important case in which the cryptographic keys are messages of bounded size.
| Year | Citations | |
|---|---|---|
Page 1
Page 1