On the semantics of communications when verifying equivalence properties - Archive ouverte HAL Access content directly
Journal Articles Journal of Computer Security Year : 2020

On the semantics of communications when verifying equivalence properties

(1) , (2) , (2)


Symbolic models for security protocol verification were pioneered by Dolev and Yao in their seminal work. Since then, although inspired by the same ideas, many variants of the original model were developed. In particular, a common assumption is that the attacker has complete control over the network and can therefore intercept any message. This assumption has been interpreted in slightly different ways depending on the particular models: either any protocol output is directly routed to the adversary, or communications may be among any two participants, including the attacker-the scheduling between which exact parties the communication happens is left to the attacker. This difference may seem unimportant at first glance and, depending on the verification tools, either one or the other semantics is implemented. We show that, unsurprisingly, they indeed coincide for reachability properties. However, for indistinguishability properties, we prove that these two interpretations lead to incomparable semantics. We also introduce and study a new semantics, where internal communications are allowed but messages are always eavesdropped by the attacker. This new semantics yields strictly stronger equivalence relations. Moreover, we identify two subclasses of protocols for which the three semantics coincide. Finally, we implemented verification of trace equivalence for each of the three semantics in the DeepSec tool and compare their performances on several classical examples.
Fichier principal
Vignette du fichier
main.pdf (805.02 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-02446910 , version 1 (21-01-2020)



Kushal Babel, Vincent Cheval, Steve Kremer. On the semantics of communications when verifying equivalence properties. Journal of Computer Security, 2020, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩. ⟨hal-02446910⟩
63 View
275 Download



Gmail Facebook Twitter LinkedIn More