Solving the insecurity problem for assertions

08/26/2023
by   R Ramanujam, et al.
0

In the symbolic verification of cryptographic protocols, a central problem is deciding whether a protocol admits an execution which leaks a designated secret to the malicious intruder. Rusinowitch Turuani (2003) show that, when considering finitely many sessions, this “insecurity problem” is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be simulated by one where the intruder only communicates terms of bounded size. However, when we consider models where, in addition to terms, one can also communicate logical statements about terms, the analysis of the insecurity problem becomes tricky when both these inference systems are considered together. In this paper we consider the insecurity problem for protocols with logical statements that include equality on terms and existential quantification. Witnesses for existential quantifiers may be unbounded, and obtaining small witness terms while maintaining equality proofs complicates the analysis considerably. We extend techniques from Rusinowitch Turuani (2003) to show that this problem is also in NP.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/09/2022

Protocol Insecurity with Assertions

In the study of symbolic verification of cryptographic protocols, a cent...
research
08/28/2023

CryptoBap: A Binary Analysis Platform for Cryptographic Protocols

We introduce CryptoBap, a platform to verify weak secrecy and authentica...
research
04/01/2021

The complete classification for quantified equality constraints

We prove that QCSP(ℕ;x=y→ y=z) is PSpace-complete, settling a question o...
research
09/07/2022

Small Proofs from Congruence Closure

Satisfiability Modulo Theory (SMT) solvers and equality saturation engin...
research
10/26/2020

Protocol Analysis with Time

We present a framework suited to the analysis of cryptographic protocols...
research
11/14/2019

Securely Computing the n-Variable Equality Function with 2n Cards

Research on the area of secure multi-party computation using a deck of p...
research
12/18/2019

Practical Relativistic Zero-Knowledge for NP

In this work we consider the following problem: in a Multi-Prover enviro...

Please sign up or login with your details

Forgot password? Click here to reset