## Automating security analysis: symbolic equivalence of constraint systems

Vincent Cheval, Hubert Comon-Lundh, and Stéphanie Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), pp. 412–426, Lecture Notes in Artificial Intelligence 6173, Springer-Verlag, Edinburgh, Scotland, UK, July 2010.

### Abstract

We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy).
Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence.

### BibTeX

@inproceedings{CCD-ijcar10,
abstract =      {We consider security properties of cryptographic
protocols, that are either trace properties (such as
confidentiality or authenticity) or equivalence
properties (such as anonymity or strong secrecy).\par
Infinite sets of possible traces are symbolically
represented using \emph{deducibility constraints}. We
give a new algorithm that decides the trace
equivalence for the traces that are represented using
such constraints, in the case of signatures,
symmetric and asymmetric encryptions. Our algorithm
is implemented and performs well on typical
benchmarks. This is the first implemented algorithm,
deciding symbolic trace equivalence.},
address =       {Edinburgh, Scotland, UK},
author =        {Cheval, Vincent and Comon{-}Lundh, Hubert and
Delaune, St{\'e}phanie},
booktitle =     {{P}roceedings of the 5th {I}nternational {J}oint
{C}onference on {A}utomated {R}easoning ({IJCAR}'10)},
OPTDOI =           {10.1007/978-3-642-14203-1_35},
editor =        {Giesl, J{\"u}rgen and Haehnle, Reiner},
month =         jul,
pages =         {412-426},
publisher =     {Springer-Verlag},
series =        {Lecture Notes in Artificial Intelligence},
title =         {Automating security analysis: symbolic equivalence of
constraint systems},
volume =        {6173},
year =          {2010},
acronym =       {{IJCAR}'10},
nmonth =        {7},
lsv-category =  {intc},
wwwpublic =     {public and ccsb},
}