30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3<br />

<strong>Analysis</strong> <strong>of</strong> protocols with collision<br />

vulnerable hash functions<br />

In this chapter, we consider the class <strong>of</strong> cryptographic protocols<br />

that use collision vulnerable hash functions. Only a few years ago,<br />

it was intractable to compute collisions on hash functions, so they<br />

were considered to be collision resistant by cryptographers, <strong>and</strong> protocols<br />

were built upon this assumption. From the nineties on, several<br />

authors [98, 103, 199, 201] have proved the tractability <strong>of</strong> finding collision<br />

attacks over several hash functions, <strong>and</strong> some practical methods<br />

have been published to compute collisions on some commonly used<br />

hash functions.<br />

Following the symbolic method introduced in Chapter 2, we reduce<br />

the insecurity problem <strong>of</strong> our class <strong>of</strong> cryptographic protocols<br />

to the ordered satisfiability problem for the intruder that uses the collision<br />

vulnerability property <strong>of</strong> hash functions when attacking a protocol<br />

execution. We give an algorithm that the intruder employs to<br />

compute collisions on hash functions. By this algorithm <strong>and</strong> roughly<br />

following the results obtained in [74], we conjecture that the ordered<br />

satisfiability problem for the intruder exploiting the collision vulnerability<br />

property <strong>of</strong> hash functions can be reduced to the ordered satisfiability<br />

problem for an intruder operating on words, that is with an<br />

associative symbol <strong>of</strong> concatenation, <strong>and</strong> we show the decidability <strong>of</strong><br />

the last problem. The decidability <strong>of</strong> the ordered satisfiability problem<br />

for the intruder operating on words is interesting in its own right<br />

as it is the first decidability result that we are aware <strong>of</strong> for an intruder<br />

system for which unification is infinitary, <strong>and</strong> that permits to consider<br />

in other contexts an associative concatenation <strong>of</strong> messages instead <strong>of</strong><br />

their pairing. The results <strong>of</strong> this Chapter have been published in the<br />

proceedings <strong>of</strong> ASIAN 2006 conference [67].<br />

57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!