2005
Recursion vs. Replication in Simple Cryptographic Protocols
HUTTEL, Hans a Jiří SRBAZákladní údaje
Originální název
Recursion vs. Replication in Simple Cryptographic Protocols
Název česky
Rekurze a replikace a jednoduchych kryptografickych protokolech
Autoři
HUTTEL, Hans (208 Dánsko) a Jiří SRBA (203 Česká republika, garant)
Vydání
Netherlands, Proceedings of 31st Annual Conference on Current Trends in Theory and Practice of Informatics (SOFSEM'05), od s. 175-184, 10 s. 2005
Nakladatel
Springer-Verlag
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Obor
10201 Computer sciences, information science, bioinformatics
Stát vydavatele
Nizozemské království
Utajení
není předmětem státního či obchodního tajemství
Kód RIV
RIV/00216224:14330/05:00012753
Organizační jednotka
Fakulta informatiky
Klíčová slova anglicky
cryptographic protocols; recursion; replication; verification
Změněno: 6. 7. 2007 09:03, RNDr. JUDr. Vladimír Šmíd, CSc.
V originále
We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable.
Česky
We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable.
Návaznosti
GA201/03/1161, projekt VaV |
| ||
MSM0021622419, záměr |
| ||
1M0545, projekt VaV |
|