30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

28 CHAPTER 2. PROTOCOL ANALYSIS USING CONSTRAINT SOLVING<br />

Figure 2.3 Unfailing Knuth-Bendix procedure<br />

Input:<br />

An equational theory H <strong>and</strong> a complete simplification ordering > over T (F, X ).<br />

Initialisation:<br />

For each equation l · = r ∈ H, orient this equation into rule if possible<br />

repeat<br />

- Find an extended critical pair 〈l, r〉<br />

- Reduce it using the existing equations as much as possible.<br />

- If the resulting pair is not trivial, orient it into a rule if possible.<br />

until no more new extended critical pair is generated.<br />

Output:<br />

the system constructed from the set <strong>of</strong> rules <strong>and</strong> equations obtained at the end <strong>of</strong><br />

the procedure.<br />

then the pair 〈dσ, g[p ← r]σ〉 is an extended critical pair <strong>of</strong> the equations l = r <strong>and</strong><br />

g · ·<br />

= d. The equations l = r <strong>and</strong> g · = d do not need to be different in order to compute<br />

their extended critical pairs, furthermore, we assume that the equations l · = r <strong>and</strong> g · = d<br />

do not share variables, <strong>and</strong> to this end, we rename their variables before computing their<br />

extended critical pairs.<br />

·<br />

We remark that if the equations l = r <strong>and</strong> g · = d are orientable, then (2) <strong>and</strong><br />

(3) become (2 ′ ) lσ > rσ <strong>and</strong> (3 ′ ) gσ > dσ, <strong>and</strong> the procedure to construct an<br />

extended critical pair become equivalent to the procedure to construct a critical<br />

pair.<br />

·<br />

Given a term s, s is said to be reducible by an equation l = r if there is a<br />

position p ∈ P os(s), <strong>and</strong> a substitution σ such that (i) s|p = lσ, <strong>and</strong> (ii) lσ > rσ.<br />

In this case, we say that s is reducible to s[p ← rσ] using the equation l · = r.<br />

Given an equational theory H <strong>and</strong> a complete simplification ordering >,<br />

in [120], the authors showed that if the procedure terminates <strong>and</strong> the obtained<br />

system does not contain unorientable equations then the obtained system is a<br />

convergent rewrite system equivalent to H. They showed also that if the procedure<br />

terminates <strong>and</strong> the obtained system contains unorientable equations then<br />

the obtained system is a ground convergent rewrite system equivalent to H.<br />

In the remainder <strong>of</strong> this chapter, we assume F to be a signature, H to<br />

be an equational theory on T (F, X ), <strong>and</strong> R to be a convergent rewrite<br />

system generating H.<br />

·

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!