30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66 CHAPTER 3. PROTOCOLS WITH VULNERABLE HASH FUNCTIONS<br />

3.3.5 Symbolic derivation<br />

Given a intruder system I = 〈F, LI, H〉, <strong>and</strong> a protocol P. At step i, a role in<br />

P receives a (possibly ∅) message, checks its well-formedness by verifying that<br />

it is as expected, <strong>and</strong> applies rules in LI to construct the response. We give in<br />

Definition 30 (Chapter 2) a specification <strong>of</strong> role, this specification is adequate<br />

when the intruder deduction rules are <strong>of</strong> the form x1, . . . , xn → f(x1, . . . , xn)<br />

with f a public function symbol in F. Since, in this chapter, we consider a<br />

different form <strong>of</strong> the intruder deduction rules (Definition 35), we represent a<br />

role by a symbolic derivation [72].<br />

Definition 40 (Symbolic Derivations) Let I = 〈F, LI, H〉 be an intruder deduction<br />

system. A I-symbolic derivation is a tuple (V, S, K, In, Out) where V is a finite sequence<br />

<strong>of</strong> variables (xi)i∈Ind, indexed by a linearly ordered set (Ind,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!