首页    期刊浏览 2024年10月07日 星期一
登录注册

文章基本信息

  • 标题:Computationally Complete Symbolic Attacker in Action
  • 本地全文:下载
  • 作者:Gergei Bana ; Pedro Adao ; Hideki Sakurada
  • 期刊名称:LIPIcs : Leibniz International Proceedings in Informatics
  • 电子版ISSN:1868-8969
  • 出版年度:2012
  • 卷号:18
  • 页码:546-560
  • DOI:10.4230/LIPIcs.FSTTCS.2012.546
  • 出版社:Schloss Dagstuhl -- Leibniz-Zentrum fuer Informatik
  • 摘要:We show that the recent technique of computationally complete symbolic attackers proposed by Bana and Comon-Lundh [POST 2012] for computationally sound verification of security protocols is powerful enough to verify actual protocols. In their work, Bana and Comon-Lundh presented only the general framework, but they did not introduce sufficiently many axioms to actually prove protocols. We present a set of axioms -- some generic axioms that are computationally sound for all PPT algorithms, and two specific axioms that are sound for CCA2 secure encryptions -- and illustrate the power of this technique by giving the first computationally sound verification (secrecy and authentication) via symbolic attackers of the NSL Protocol that does not need any further restrictive assumptions about the computational implementation. The axioms are entirely modular, not particular to the NSL protocol.
  • 关键词:Security Protocols; Symbolic Adversary; Computational Soundness
国家哲学社会科学文献中心版权所有