Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity

  • Authors:
  • Zhiyao Liang;Rakesh M. Verma

  • Affiliations:
  • Computer Science Department, University of Houston, Houston Texas, USA 77204-3010;Computer Science Department, University of Houston, Houston Texas, USA 77204-3010

  • Venue:
  • ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We improve the NP proof for the insecurity problem, partly motivated by an error in the NP proof of the influential paper "Protocol insecurity with a finite number of sessions and composed keys is NP-complete" by Rusinowitch and Turuani [1]. We enhance several different aspects of the proofs with a complete presentation, and we prove stronger results that fix the non-trivial error. Besides fixing the error, our proof framework has reusable structure and proves several results that are neither covered nor proved in [1] and its sequels, including the important fact that the attacker does not need to generate nonces in an attack, which the proof of [1] relies on. We show a sharper result that the complexity of the derivation problem is in square time. Furthermore, we extend the scope of the NP complexity to cover the scenarios where a fixed number of role instances are assumed, and delayed decryption is allowed. These are new results since the NP result of assuming a fixed number of role instances does not seem to be obtainable by a reduction from the NP result of assuming a fixed number of sessions, and [1] and its sequels cannot handle delayed decryption.