Homomorphisms and Minimality for Enrich-by-Need Security Analysis

04/19/2018
by   Daniel J. Dougherty, et al.
0

Cryptographic protocols are used in different environments, but existing methods for protocol analysis focus only on the protocols, without being sensitive to assumptions about their environments. LPA is a tool which analyzes protocols in context. LPA uses two programs, cooperating with each other: CPSA, a well-known system for protocol analysis, and Razor, a model-finder based on SMT technology. Our analysis follows the enrich-by-need paradigm, in which models of protocol execution are generated and examined. The choice of which models to generate is important, and we motivate and evaluate LPA's strategy of building minimal models. "Minimality" can be defined with respect to either of two preorders, namely the homomorphism preorder and the embedding preorder (i.e. the preorder of injective homomorphisms); we discuss the merits of each. Our main technical contributions are algorithms for building homomorphism-minimal models and for generating a set-of-support for the models of a theory, in each case by scripting interactions with an SMT solver.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/26/2020

Protocol Analysis with Time

We present a framework suited to the analysis of cryptographic protocols...
research
03/01/2019

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions

In this paper, we show how practical the little theorem of witness funct...
research
04/26/2023

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

We propose a security verification framework for cryptographic protocols...
research
06/21/2022

Deep dive into Interledger: Understanding the Interledger ecosystem

At the technical level, the goal of Interledger is to provide an archite...
research
04/16/2018

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

Enrich-by-need protocol analysis is a style of symbolic protocol analysi...
research
04/22/2019

Strand Spaces with Choice via a Process Algebra Semantics

Roles in cryptographic protocols do not always have a linear execution, ...
research
02/09/2022

Protocol Insecurity with Assertions

In the study of symbolic verification of cryptographic protocols, a cent...

Please sign up or login with your details

Forgot password? Click here to reset