30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

158 CHAPTER 6. ON THE GROUND ENTAILMENT PROBLEMS<br />

clause CS where I is the unique predicate symbols used in CI ∪CS <strong>and</strong> such that<br />

CI ∪ CS is saturated by ordered resolution. This insecurity problem outputs unsat<br />

if <strong>and</strong> only if CPθ ∪ ICI∪CS is unsatisfiable, for a substitution θ grounding for<br />

CP. S. Delaune, H. Lin <strong>and</strong> Ch. Lynch showed the decidability <strong>of</strong> this problem.<br />

While in the above sections (Section 6.3.1, 6.3.2 <strong>and</strong> 6.3.3), the secrecy property<br />

is the unique studied security property, other security properties can also<br />

be encoded as Horn Clauses. B. Blanchet has encoded authentication [47], <strong>and</strong><br />

strong secrecy [51].<br />

6.4 Our contribution<br />

In Section 6.3, we have presented some decidable fragments <strong>of</strong> first order logic,<br />

<strong>and</strong> showed their use in the analysis <strong>of</strong> security protocols. To this end, intruder<br />

rules, protocol description <strong>and</strong> security property are represented by<br />

Horn clauses <strong>and</strong> the insecurity problem is reduced to the satisfiability problem<br />

<strong>of</strong> a fragment <strong>of</strong> first order logic.<br />

In this section, we present our model to analyse security protocols using<br />

Horn clauses. As opposite to the models represented in Section 6.3, we do<br />

not represent protocol description by Horn clauses. As showed in Chapter<br />

2, one line <strong>of</strong> research reduces the insecurity problem <strong>of</strong> cryptographic protocols<br />

to an intruder reachability problem, also called I-reachability problem,<br />

<strong>and</strong> in this chapter we reduce the I-reachability problem to the entailment<br />

problem (or satisfiability problem) in first order logic. We remark that Horn<br />

clauses <strong>and</strong> a unique unary predicate symbol I are sufficient to analyse security<br />

protocols. The predicate symbol I represents the knowledge <strong>of</strong> the intruder:<br />

I(m) means that the intruder knows the term (or message) m. Thus a clause<br />

I(u1), . . . , I(un) → I(v) should be read as “if the intruder knows some messages<br />

<strong>of</strong> the form u1, . . . , un, then he knows a message <strong>of</strong> the form v”. For example,<br />

let us consider the clause I(x), I(y) → I(< x, y >), <strong>and</strong> assume that<br />

the intruder knows the messages a, b, then, due to the clause given above, the<br />

intruder knows also the message < a, b >. There is thus a natural correspondence<br />

between constraint systems (respectively solving <strong>of</strong> constraint systems)<br />

<strong>and</strong> Horn clauses (respectively entailment problems).<br />

6.4.1 Model for cryptographic protocols<br />

Intruder clauses<br />

Let I be an intruder <strong>and</strong> let LI be its deduction system (LI represents the<br />

intruder capacities). LI is a set <strong>of</strong> rules <strong>of</strong> the form u1, . . . , un → v where<br />

u1, . . . , vn, v are terms in the given algebra. The set <strong>of</strong> clauses associated with

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!