约束求解技术和用方程理论丰富模型

Hubert Comon-Lundh, S. Delaune, J. Millen
{"title":"约束求解技术和用方程理论丰富模型","authors":"Hubert Comon-Lundh, S. Delaune, J. Millen","doi":"10.3233/978-1-60750-714-7-35","DOIUrl":null,"url":null,"abstract":"Derivability constraints represent in a symbolic way the in finite set of possible executions of a finite protocol, in presence of an ar bitr y active attacker. Solving a derivability constraint consists in computing a s implified representation of such executions, which is amenable to the verification of a ny (trace) security property. Our goal is to explain this method on a non-trivial combination of primitives. In this chapter we explain how to model the protocol executio ns using derivability constraints, and how such constraints are interpreted, d pending on the cryptographic primitives and the assumed attacker capabilitie s. Such capabilities are represented as a deduction system that has some specific prop erties. We choose as an example the combination of exclusive-or, symmetric encr yption/decryption and pairing/unpairing. We explain the properties of the deduct ion system in this case and give a complete and terminating set of rules that solves d erivability constraints. A similar set of rules has been already published for the clas sic l Dolev-Yao attacker, but it is a new result for the combination of primitiv es that we consider. This allows to decide trace security properties for this com bination of primitives and arbitrary finite protocols.","PeriodicalId":253475,"journal":{"name":"Formal Models and Techniques for Analyzing Security Protocols","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Constraint solving techniques and enriching the model with equational theories\",\"authors\":\"Hubert Comon-Lundh, S. Delaune, J. Millen\",\"doi\":\"10.3233/978-1-60750-714-7-35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Derivability constraints represent in a symbolic way the in finite set of possible executions of a finite protocol, in presence of an ar bitr y active attacker. Solving a derivability constraint consists in computing a s implified representation of such executions, which is amenable to the verification of a ny (trace) security property. Our goal is to explain this method on a non-trivial combination of primitives. In this chapter we explain how to model the protocol executio ns using derivability constraints, and how such constraints are interpreted, d pending on the cryptographic primitives and the assumed attacker capabilitie s. Such capabilities are represented as a deduction system that has some specific prop erties. We choose as an example the combination of exclusive-or, symmetric encr yption/decryption and pairing/unpairing. We explain the properties of the deduct ion system in this case and give a complete and terminating set of rules that solves d erivability constraints. A similar set of rules has been already published for the clas sic l Dolev-Yao attacker, but it is a new result for the combination of primitiv es that we consider. This allows to decide trace security properties for this com bination of primitives and arbitrary finite protocols.\",\"PeriodicalId\":253475,\"journal\":{\"name\":\"Formal Models and Techniques for Analyzing Security Protocols\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Formal Models and Techniques for Analyzing Security Protocols\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/978-1-60750-714-7-35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Formal Models and Techniques for Analyzing Security Protocols","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-60750-714-7-35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

摘要

衍生性约束以一种符号的方式表示有限协议的有限可能执行集,存在一个活跃的攻击者。求解可衍生性约束包括计算此类执行的简化表示,该表示适用于ny(跟踪)安全属性的验证。我们的目标是在一个重要的原语组合上解释这个方法。在本章中,我们将解释如何使用衍生性约束对协议执行进行建模,以及如何解释这些约束,这些约束取决于加密原语和假定的攻击者能力。这些能力被表示为具有一些特定prop属性的演绎系统。我们选择异或对称加密/解密和配对/解配对的组合作为示例。在这种情况下,我们解释了演绎系统的性质,并给出了一套完整的、终止的规则来解决可推导性约束。针对经典的Dolev-Yao攻击者已经发布了一组类似的规则,但对于我们考虑的原语组合来说,这是一个新的结果。这允许为这种原语和任意有限协议的组合确定跟踪安全属性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Constraint solving techniques and enriching the model with equational theories
Derivability constraints represent in a symbolic way the in finite set of possible executions of a finite protocol, in presence of an ar bitr y active attacker. Solving a derivability constraint consists in computing a s implified representation of such executions, which is amenable to the verification of a ny (trace) security property. Our goal is to explain this method on a non-trivial combination of primitives. In this chapter we explain how to model the protocol executio ns using derivability constraints, and how such constraints are interpreted, d pending on the cryptographic primitives and the assumed attacker capabilitie s. Such capabilities are represented as a deduction system that has some specific prop erties. We choose as an example the combination of exclusive-or, symmetric encr yption/decryption and pairing/unpairing. We explain the properties of the deduct ion system in this case and give a complete and terminating set of rules that solves d erivability constraints. A similar set of rules has been already published for the clas sic l Dolev-Yao attacker, but it is a new result for the combination of primitiv es that we consider. This allows to decide trace security properties for this com bination of primitives and arbitrary finite protocols.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信