30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

40 CHAPTER 2. PROTOCOL ANALYSIS USING CONSTRAINT SOLVING<br />

<strong>and</strong> the associated equational theory is defined by:<br />

H :<br />

The rules Lencs are defined as follows:<br />

� π1(< x, y >) = x<br />

π2(< x, y >) = y<br />

<strong>and</strong> the associated equational theory is defined by:<br />

The rules Lencp are defined as follows:<br />

x, y → enc s (x, y) (2.12)<br />

x, y → dec s (x, y) (2.13)<br />

Henc s = {decs (enc s (x, y), y) = x}<br />

<strong>and</strong> the associated equational theory is defined by:<br />

x, y → enc p (x, y) (2.14)<br />

x, y → dec p (x, y) (2.15)<br />

�<br />

p p −1 dec (enc (x, y), y ) = x<br />

Hdecp :<br />

decp (encp (x, y−1 ), y) = x<br />

The Dolev-Yao deduction system with explicit destructors is given by<br />

where<br />

I e DY = 〈FDY , LDY , HDY 〉<br />

• FDY = {< −, − >, enc s , dec s , enc p , dec p },<br />

• LDY = L ∪ Lencs ∪ Lencp, • HDY = H ∪ Hencs ∪ Hencp. From now on, we consider only intruder deduction systems with explicit<br />

destructors, <strong>and</strong> for simplicity, we will use the notation “intruder deduction<br />

systems” to mean “intruder deduction systems with explicit destructors”.<br />

This intruder deduction system will be denoted by I = 〈F, TI, H〉<br />

<strong>and</strong> LI denotes the set <strong>of</strong> deduction rules associated to I.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!