HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Active Intruders with Caps

Siva Anatharaman 1 Hai Lin Chris Lynch Paliath Narendran 2 Michael Rusinowitch 3
3 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. By modeling each protocol step as a rigid Horn clause, and the intruder abilities as an equational theory over a convergent rewrite system, the problem of active intrusion is formulated as a Cap Unification problem. Cap Unification is an extension of Equational Unification: we look for a cap to be placed on a given set of terms, so that it unifies with a given term modulo the equational theory.
Document type :
Conference papers
Complete list of metadata

Contributor : Michaël Rusinowitch Connect in order to contact the contributor
Submitted on : Tuesday, October 14, 2008 - 4:26:45 PM
Last modification on : Friday, January 21, 2022 - 3:09:00 AM


  • HAL Id : inria-00330532, version 1


Siva Anatharaman, Hai Lin, Chris Lynch, Paliath Narendran, Michael Rusinowitch. Active Intruders with Caps. FCS-ARSPA-WITS'08, Jun 2008, Pittsburgh, United States. ⟨inria-00330532⟩



Record views