Symbolic verification of privacy-type properties for security protocols with XOR (extended version)

Abstract : In symbolic verification of security protocols, process equivalences have recently been used extensively to model strong secrecy, anonymity and unlinkability properties. However, tool support for automated analysis of equivalence properties is limited compared to trace properties, e.g., modeling authentication and weak notions of secrecy. In this paper, we present a novel procedure for verifying equivalences on finite processes, i.e., without replication, for protocols that rely on various cryptographic primitives including exclusive or (xor). We have implemented our procedure in the tool AKISS, and successfully used it on several case studies that are outside the scope of existing tools, e.g., unlinkability on various RFID protocols, and resistance against guessing attacks on protocols that use xor.
Document type :
Reports
Complete list of metadatas

Cited literature [39 references]  Display  Hide  Download

https://hal.inria.fr/hal-01533694
Contributor : Steve Kremer <>
Submitted on : Tuesday, June 6, 2017 - 5:11:30 PM
Last modification on : Tuesday, October 8, 2019 - 4:36:17 PM
Long-term archiving on : Thursday, September 7, 2017 - 2:09:38 PM

File

main.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01533694, version 1

Citation

David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer. Symbolic verification of privacy-type properties for security protocols with XOR (extended version). [Research Report] Inria Nancy - Grand Est. 2017, pp.29. ⟨hal-01533694⟩

Share

Metrics

Record views

596

Files downloads

166