Hierarchical combination of intruder theories - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Article Dans Une Revue Information and Computation Année : 2008

Hierarchical combination of intruder theories

Résumé

Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weaknesses, by a more accurate modelling of operators employed by protocols. Several works have shown how to handle a single algebraic operator (associated with a fixed intruder theory) or how to combine several operators satisfying disjoint theories. However several interesting equational theories, such as exponentiation with an abelian group law for exponents remain out of the scope of these techniques. This has motivated us to introduce a new notion of hierarchical combination for non-disjoint intruder theories and to show decidability results for the deduction problem in these theories. We have also shown that under natural hypotheses hierarchical intruder constraints can be decided. This result applies to an exponentiation theory that appears to be more general than the one considered before.
Fichier principal
Vignette du fichier
main.pdf (333.53 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00329715 , version 1 (13-10-2008)

Identifiants

Citer

Yannick Chevalier, Michael Rusinowitch. Hierarchical combination of intruder theories. Information and Computation, 2008, 206 (2-4), pp.352-377. ⟨10.1016/j.ic.2007.07.004⟩. ⟨inria-00329715⟩
209 Consultations
198 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More