Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), pp. 412–426, Lecture Notes in Artificial Intelligence 6173, Springer-Verlag, Edinburgh, Scotland, UK, July 2010.
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy).
Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence.
@inproceedings{CCD-ijcar10, abstract = {We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy).\par Infinite sets of possible traces are symbolically represented using \emph{deducibility constraints}. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence.}, address = {Edinburgh, Scotland, UK}, author = {Cheval, Vincent and Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, booktitle = {{P}roceedings of the 5th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'10)}, OPTDOI = {10.1007/978-3-642-14203-1_35}, editor = {Giesl, J{\"u}rgen and Haehnle, Reiner}, month = jul, pages = {412-426}, publisher = {Springer-Verlag}, series = {Lecture Notes in Artificial Intelligence}, title = {Automating security analysis: symbolic equivalence of constraint systems}, volume = {6173}, year = {2010}, acronym = {{IJCAR}'10}, nmonth = {7}, lsv-category = {intc}, wwwpublic = {public and ccsb}, }