DeepSec: Deciding Equivalence Properties for Security Protocols – Improved theory and practice

11/06/2022
by   Vincent Cheval, et al.
0

Automated verification has become an essential part in the security evaluation of cryptographic protocols. In this context privacy-type properties are often modelled by indistinguishability statements, expressed as behavioural equivalences in a process calculus. In this paper we contribute both to the theory and practice of this verification problem. We establish new complexity results for static equivalence, trace equivalence and labelled bisimilarity and provide a decision procedure for these equivalences in the case of a bounded number of protocol sessions. Our procedure is the first to decide trace equivalence and labelled bisimilarity exactly for a large variety of cryptographic primitives – those that can be represented by a subterm convergent destructor rewrite system. We also implemented the procedure in a new tool, DeepSec. We showed through extensive experiments that it is significantly more efficient than other similar tools, while at the same time raises the scope of the protocols that can be analysed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/09/2019

Trace Equivalence and Epistemic Logic to Express Security Properties

In process algebras, security properties are expressed as equivalences b...
research
11/06/2018

A Bisimilarity Congruence for the Applied pi-Calculus Sufficiently Coarse to Verify Privacy Properties

This paper is the first thorough investigation into the coarsest notion ...
research
08/28/2017

A Type System for Privacy Properties (Technical Report)

Mature push button tools have emerged for checking trace properties (e.g...
research
04/10/2018

POR for Security Protocol Equivalences: Beyond Action-Determinism

Formal methods have proved effective to automatically analyze protocols....
research
05/28/2018

Automated Verification of Accountability in Security Protocols

Accounting for misbehavior, instead of postulating trustworthiness, has ...
research
11/16/2018

Deciding Indistinguishability

Computational indistinguishability is a key property in cryptography and...
research
05/19/2023

Making = Practical: Efficient Interactive Protocols for BDD Algorithms

We show that interactive protocols between a prover and a verifier, a we...

Please sign up or login with your details

Forgot password? Click here to reset