30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

94 CHAPTER 4. PROTOCOLS WITH VULNERABLE SIGNATURE SCHEMES<br />

a new pair <strong>of</strong> secret <strong>and</strong> public keys (Sk”(pk, s), P k”(pk, s)), a new message m ′<br />

(m ′ = f(pk, s)) such that the verification <strong>of</strong> s with respect to the new message m ′<br />

<strong>and</strong> the new public key succeeds. We assume that FDEO = FDEOpub ∪ FDEOpri<br />

where FDEOpub = {sig, ver, Sk”, P k”, f, 1} <strong>and</strong> FDEOpri = {Sk, P k}.<br />

In addition to the signature FDEO, <strong>and</strong> as described in Chapter 2, we make<br />

use <strong>of</strong> an infinite set <strong>of</strong> variables X <strong>and</strong> an infinite set <strong>of</strong> constants C.<br />

The destructive exclusive ownership vulnerability property is represented<br />

by the following equational theory, denoted by HDEO:<br />

⎧<br />

⎨ ver(x, sig(x, Sk(y)), P k(y)) = 1<br />

HDEO = ver(x, sig(x, Sk”(y1, y2)), P k”(y1, y2)) = 1<br />

⎩<br />

sig(f(P k(y), sig(x, Sk(y))), Sk”(P k(y), sig(x, Sk(y))) = sig(x, Sk(y))<br />

The intruder system we consider to analyse our class <strong>of</strong> cryptographic protocols<br />

is given as follows:<br />

with:<br />

⎧<br />

⎪⎨<br />

⎪⎩<br />

IDEO = 〈FDEO, TDEO, HDEO〉<br />

FDEO = FDEOpub ∪ FDEOpri<br />

FDEOpub = {sig, ver, Sk”, P k”, f, 1}<br />

FDEOpri = {Sk, P k}<br />

TDEO = {sig(x, y), ver(x, y, z), Sk”(x, y), P k”(x, y), f(x, y), 1}<br />

The associated set <strong>of</strong> intruder deduction rules, denoted by LDEO is given as<br />

follows:<br />

⎧<br />

x, y → sig(x, y)<br />

⎪⎨<br />

x, y, z → ver(x, y, z)<br />

x, y → Sk”(x, y)<br />

LDEO =<br />

x, y → P k”(x, y)<br />

⎪⎩<br />

x, y → f(x, y)<br />

∅ → 1<br />

In what follows, we introduce the rewrite system, RDEO, generating the equational<br />

theory HDEO, <strong>and</strong> we prove that RDEO is convergent. The rewrite system<br />

RDEO is obtained by applying Knuth-Bendix completion procedure [131] on<br />

HDEO. This completion procedure is described in Chapter 2, at Section 2.1.6.<br />

Lemma 28 HDEO is generated by the convergent rewriting system:<br />

⎧<br />

⎪⎨<br />

ver(x, sig(x, Sk(y)), P k(y)) → 1<br />

ver(x, sig(x, Sk”(y1, y2)), P k”(y1, y2)) → 1<br />

RDEO =<br />

⎪⎩<br />

ver(f(P k(y), sig(x, Sk(y))), sig(x, Sk(y)), P k”(P k(y), sig(x, Sk(y)))) → 1<br />

sig(f(P k(y), sig(x, Sk(y))), Sk”(P k(y), sig(x, Sk(y)))) → sig(x, Sk(y))

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!