Sciweavers

LPAR
2007
Springer

Verifying Cryptographic Protocols with Subterms Constraints

14 years 5 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing of messages by agents or intruders: Information expected in a protocol message has to be located at a fixed position. However this is too restrictive for instance to model web-service protocols where messages are XML semi-structured documents and where significant information (name, signature, . . . ) has to be extracted from some nodes occurring at flexible positions. Therefore we extend the standard Dolev Yao intruder model by a subterm predicate that allows one to express a larger class of protocols that employs data extraction by subterm matching. This also allows one to detect socalled rewriting attacks that are specific to web-services. In particular we show that protocol insecurity is decidable with complexity NP for finite sessions in this new model. The proof is not a consequence of the standard...
Yannick Chevalier, Denis Lugiez, Michaël Rusi
Added 08 Jun 2010
Updated 08 Jun 2010
Type Conference
Year 2007
Where LPAR
Authors Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch
Comments (0)