30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Abstract<br />

This thesis is developed in the framework <strong>of</strong> symbolic analysis <strong>of</strong> cryptographic<br />

protocols. The contributions <strong>of</strong> this thesis can be split into three mains parts:<br />

1. We analyse the three classes <strong>of</strong> cryptographic protocols using respectively collision<br />

vulnerable hash functions, key substitution vulnerable digital signature<br />

schemes, <strong>and</strong> cryptographic primitives represented by convergent equational theories<br />

having the finite variant property.<br />

• We conjecture that the verification problem <strong>of</strong> the first class <strong>of</strong> protocols can<br />

be reduced to the verification problem <strong>of</strong> the class <strong>of</strong> cryptographic protocols<br />

using an associative symbol <strong>of</strong> concatenation, <strong>and</strong> we show the decidability<br />

<strong>of</strong> the verification problem for the last class.<br />

• We show the decidability <strong>of</strong> the verification problem for the second two<br />

classes <strong>of</strong> protocols.<br />

2. We show the decidability <strong>of</strong> the ground entailment problem for a new fragment<br />

<strong>of</strong> first order logic, <strong>and</strong> we show the application <strong>of</strong> this result on the verification<br />

problem <strong>of</strong> cryptographic protocols.<br />

3. We analyse the electronic-voting protocols, <strong>and</strong> we give a formal definition for<br />

the voter-verifiability property. We also show that some well-known electronic<br />

voting protocols satisfy this property.<br />

Keywords: Security protocols, electronic-voting protocols, decision procedures,<br />

algebraic primitives, constraint systems, first order clauses, resolution,<br />

saturation, applied π calculus.<br />

This thesis is presented <strong>and</strong> defended at Toulouse on the 9 th <strong>of</strong> December<br />

2009, was performed under the supervision <strong>of</strong> Yannick Chevalier <strong>and</strong><br />

Philippe Balbiani. The author obtained the degree <strong>of</strong> Docteur en Informatique<br />

de l’Université de Toulouse.<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!