Easy intruder deduction problems with homomorphisms

We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical Dolev–Yao model by permitting the intruder to exploit these properties. More prec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information processing letters 2006-03, Vol.97 (6), p.213-218
1. Verfasser: Delaune, Stéphanie
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 218
container_issue 6
container_start_page 213
container_title Information processing letters
container_volume 97
creator Delaune, Stéphanie
description We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical Dolev–Yao model by permitting the intruder to exploit these properties. More precisely, we are interested in theories such as Exclusive or and Abelian groups in combination with the homomorphism axiom. We show that the intruder deduction problem is in PTIME in both cases, improving the EXPTIME complexity results of Lafourcade, Lugiez and Treinen.
doi_str_mv 10.1016/j.ipl.2005.11.008
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_237287593</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020019005003248</els_id><sourcerecordid>980972481</sourcerecordid><originalsourceid>FETCH-LOGICAL-c354t-7c76e7c24bf54950b5277654a7f6613946d231642cb1c9e1582944247a3eff1d3</originalsourceid><addsrcrecordid>eNp9kEtLw0AQxxdRsFY_gLcgeEyc2WeCJyn1AQUvel6SzYZuyMvdVOm3d0sL3mQOc_k_Zn6E3CJkCCgf2sxNXUYBRIaYAeRnZIG5oqlELM7JAoBCCljAJbkKoQUAyZlaELYuwz5xw-x3tfVJbeudmd04JJMfq872Iflx8zbZjn0cP21d6MM1uWjKLtib016Sz-f1x-o13by_vK2eNqlhgs-pMkpaZSivGsELAZWgSknBS9VIiazgsqYMJaemQlNYFDktOKdclcw2DdZsSe6OufGWr50Ns27HnR9ipaZM0VyJgkURHkXGjyF42-jJu770e42gD2h0qyMafUCjEXVEEz33p-AymLJrfDkYF_6MSoCieMh-POps_PLbWa-DcXYwtnbemlnXo_un5RdiSXdG</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>237287593</pqid></control><display><type>article</type><title>Easy intruder deduction problems with homomorphisms</title><source>Elsevier ScienceDirect Journals</source><creator>Delaune, Stéphanie</creator><creatorcontrib>Delaune, Stéphanie</creatorcontrib><description>We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical Dolev–Yao model by permitting the intruder to exploit these properties. More precisely, we are interested in theories such as Exclusive or and Abelian groups in combination with the homomorphism axiom. We show that the intruder deduction problem is in PTIME in both cases, improving the EXPTIME complexity results of Lafourcade, Lugiez and Treinen.</description><identifier>ISSN: 0020-0190</identifier><identifier>EISSN: 1872-6119</identifier><identifier>DOI: 10.1016/j.ipl.2005.11.008</identifier><identifier>CODEN: IFPLAT</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; Artificial intelligence ; Automatic theorem proving ; Computer science; control theory; systems ; Cryptography ; Cybersecurity ; Exact sciences and technology ; Formal methods ; Information, signal and communications theory ; Learning and adaptive systems ; Logic and foundations ; Mathematical logic, foundations, set theory ; Mathematics ; Proof theory and constructive mathematics ; Protocol ; Sciences and techniques of general use ; Security protocols ; Signal and communications theory ; Studies ; Telecommunications and information theory ; Theoretical computing</subject><ispartof>Information processing letters, 2006-03, Vol.97 (6), p.213-218</ispartof><rights>2005 Elsevier B.V.</rights><rights>2006 INIST-CNRS</rights><rights>Copyright Elsevier Sequoia S.A. Mar 31, 2006</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c354t-7c76e7c24bf54950b5277654a7f6613946d231642cb1c9e1582944247a3eff1d3</citedby><cites>FETCH-LOGICAL-c354t-7c76e7c24bf54950b5277654a7f6613946d231642cb1c9e1582944247a3eff1d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0020019005003248$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17507213$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Delaune, Stéphanie</creatorcontrib><title>Easy intruder deduction problems with homomorphisms</title><title>Information processing letters</title><description>We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical Dolev–Yao model by permitting the intruder to exploit these properties. More precisely, we are interested in theories such as Exclusive or and Abelian groups in combination with the homomorphism axiom. We show that the intruder deduction problem is in PTIME in both cases, improving the EXPTIME complexity results of Lafourcade, Lugiez and Treinen.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Automatic theorem proving</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Exact sciences and technology</subject><subject>Formal methods</subject><subject>Information, signal and communications theory</subject><subject>Learning and adaptive systems</subject><subject>Logic and foundations</subject><subject>Mathematical logic, foundations, set theory</subject><subject>Mathematics</subject><subject>Proof theory and constructive mathematics</subject><subject>Protocol</subject><subject>Sciences and techniques of general use</subject><subject>Security protocols</subject><subject>Signal and communications theory</subject><subject>Studies</subject><subject>Telecommunications and information theory</subject><subject>Theoretical computing</subject><issn>0020-0190</issn><issn>1872-6119</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLw0AQxxdRsFY_gLcgeEyc2WeCJyn1AQUvel6SzYZuyMvdVOm3d0sL3mQOc_k_Zn6E3CJkCCgf2sxNXUYBRIaYAeRnZIG5oqlELM7JAoBCCljAJbkKoQUAyZlaELYuwz5xw-x3tfVJbeudmd04JJMfq872Iflx8zbZjn0cP21d6MM1uWjKLtib016Sz-f1x-o13by_vK2eNqlhgs-pMkpaZSivGsELAZWgSknBS9VIiazgsqYMJaemQlNYFDktOKdclcw2DdZsSe6OufGWr50Ns27HnR9ipaZM0VyJgkURHkXGjyF42-jJu770e42gD2h0qyMafUCjEXVEEz33p-AymLJrfDkYF_6MSoCieMh-POps_PLbWa-DcXYwtnbemlnXo_un5RdiSXdG</recordid><startdate>20060331</startdate><enddate>20060331</enddate><creator>Delaune, Stéphanie</creator><general>Elsevier B.V</general><general>Elsevier Science</general><general>Elsevier Sequoia S.A</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20060331</creationdate><title>Easy intruder deduction problems with homomorphisms</title><author>Delaune, Stéphanie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c354t-7c76e7c24bf54950b5277654a7f6613946d231642cb1c9e1582944247a3eff1d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Automatic theorem proving</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Exact sciences and technology</topic><topic>Formal methods</topic><topic>Information, signal and communications theory</topic><topic>Learning and adaptive systems</topic><topic>Logic and foundations</topic><topic>Mathematical logic, foundations, set theory</topic><topic>Mathematics</topic><topic>Proof theory and constructive mathematics</topic><topic>Protocol</topic><topic>Sciences and techniques of general use</topic><topic>Security protocols</topic><topic>Signal and communications theory</topic><topic>Studies</topic><topic>Telecommunications and information theory</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Delaune, Stéphanie</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information processing letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Delaune, Stéphanie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Easy intruder deduction problems with homomorphisms</atitle><jtitle>Information processing letters</jtitle><date>2006-03-31</date><risdate>2006</risdate><volume>97</volume><issue>6</issue><spage>213</spage><epage>218</epage><pages>213-218</pages><issn>0020-0190</issn><eissn>1872-6119</eissn><coden>IFPLAT</coden><abstract>We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebraic properties, we extend the classical Dolev–Yao model by permitting the intruder to exploit these properties. More precisely, we are interested in theories such as Exclusive or and Abelian groups in combination with the homomorphism axiom. We show that the intruder deduction problem is in PTIME in both cases, improving the EXPTIME complexity results of Lafourcade, Lugiez and Treinen.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.ipl.2005.11.008</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-0190
ispartof Information processing letters, 2006-03, Vol.97 (6), p.213-218
issn 0020-0190
1872-6119
language eng
recordid cdi_proquest_journals_237287593
source Elsevier ScienceDirect Journals
subjects Algorithmics. Computability. Computer arithmetics
Applied sciences
Artificial intelligence
Automatic theorem proving
Computer science
control theory
systems
Cryptography
Cybersecurity
Exact sciences and technology
Formal methods
Information, signal and communications theory
Learning and adaptive systems
Logic and foundations
Mathematical logic, foundations, set theory
Mathematics
Proof theory and constructive mathematics
Protocol
Sciences and techniques of general use
Security protocols
Signal and communications theory
Studies
Telecommunications and information theory
Theoretical computing
title Easy intruder deduction problems with homomorphisms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T01%3A48%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Easy%20intruder%20deduction%20problems%20with%20homomorphisms&rft.jtitle=Information%20processing%20letters&rft.au=Delaune,%20St%C3%A9phanie&rft.date=2006-03-31&rft.volume=97&rft.issue=6&rft.spage=213&rft.epage=218&rft.pages=213-218&rft.issn=0020-0190&rft.eissn=1872-6119&rft.coden=IFPLAT&rft_id=info:doi/10.1016/j.ipl.2005.11.008&rft_dat=%3Cproquest_cross%3E980972481%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=237287593&rft_id=info:pmid/&rft_els_id=S0020019005003248&rfr_iscdi=true