Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
40 CHAPTER 2. PROTOCOL ANALYSIS USING CONSTRAINT SOLVING<br />
<strong>and</strong> the associated equational theory is defined by:<br />
H :<br />
The rules Lencs are defined as follows:<br />
� π1(< x, y >) = x<br />
π2(< x, y >) = y<br />
<strong>and</strong> the associated equational theory is defined by:<br />
The rules Lencp are defined as follows:<br />
x, y → enc s (x, y) (2.12)<br />
x, y → dec s (x, y) (2.13)<br />
Henc s = {decs (enc s (x, y), y) = x}<br />
<strong>and</strong> the associated equational theory is defined by:<br />
x, y → enc p (x, y) (2.14)<br />
x, y → dec p (x, y) (2.15)<br />
�<br />
p p −1 dec (enc (x, y), y ) = x<br />
Hdecp :<br />
decp (encp (x, y−1 ), y) = x<br />
The Dolev-Yao deduction system with explicit destructors is given by<br />
where<br />
I e DY = 〈FDY , LDY , HDY 〉<br />
• FDY = {< −, − >, enc s , dec s , enc p , dec p },<br />
• LDY = L ∪ Lencs ∪ Lencp, • HDY = H ∪ Hencs ∪ Hencp. From now on, we consider only intruder deduction systems with explicit<br />
destructors, <strong>and</strong> for simplicity, we will use the notation “intruder deduction<br />
systems” to mean “intruder deduction systems with explicit destructors”.<br />
This intruder deduction system will be denoted by I = 〈F, TI, H〉<br />
<strong>and</strong> LI denotes the set <strong>of</strong> deduction rules associated to I.