30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents<br />

1 Introduction 1<br />

1.1 <strong>Cryptographic</strong> protocols . . . . . . . . . . . . . . . . . . . . . . . . 1<br />

1.1.1 Communication via exchanges <strong>of</strong> messages . . . . . . . . . 1<br />

1.1.2 Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

1.1.3 Security properties . . . . . . . . . . . . . . . . . . . . . . . 3<br />

1.2 <strong>Cryptographic</strong> primitives . . . . . . . . . . . . . . . . . . . . . . . 4<br />

1.2.1 Concatenation . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

1.2.2 Exclusive or . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

1.2.3 Pairing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5<br />

1.2.4 Encryption schemes . . . . . . . . . . . . . . . . . . . . . . 5<br />

1.2.5 Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

1.2.6 Blind signature . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

1.2.7 Hash function . . . . . . . . . . . . . . . . . . . . . . . . . . 8<br />

1.3 Example: Needham-Schroeder protocol . . . . . . . . . . . . . . . 9<br />

1.4 <strong>Analysis</strong> <strong>of</strong> cryptographic protocols . . . . . . . . . . . . . . . . . 10<br />

1.4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

1.4.2 Symbolic analysis <strong>of</strong> cryptographic protocols . . . . . . . . 12<br />

1.5 Contributions <strong>and</strong> plan <strong>of</strong> this thesis . . . . . . . . . . . . . . . . . 15<br />

1.5.1 Decidability results in presence <strong>of</strong> algebraic operators . . . 15<br />

1.5.2 Chapter 6: Decidability result for the ground entailment<br />

problem in the first order logic . . . . . . . . . . . . . . . . 17<br />

1.5.3 Chapter 7: <strong>Analysis</strong> <strong>of</strong> electronic voting protocols: “voter<br />

verifiability” property . . . . . . . . . . . . . . . . . . . . . 18<br />

2 Protocol analysis using constraint solving 19<br />

2.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

2.1.1 Multisets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

2.1.2 Terms over a signature . . . . . . . . . . . . . . . . . . . . . 20<br />

2.1.3 Positions <strong>and</strong> subterms . . . . . . . . . . . . . . . . . . . . 21<br />

2.1.4 Substitutions . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />

2.1.5 Equational theories <strong>and</strong> rewriting systems . . . . . . . . . 22<br />

2.1.6 The completion procedures . . . . . . . . . . . . . . . . . . 24<br />

ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!