On the Relative Soundness of the Free Algebra Model for Public Key Encryption

  • Authors:
  • Christopher Lynch;Catherine Meadows

  • Affiliations:
  • Department of Mathematics and Computer Science, Clarkson Universtity, Potsdam, NY 13699-5815;Naval Research Laboratory, Center for High Assurance Computer Systems, Code 5543, Washington, DC 20375

  • Venue:
  • Electronic Notes in Theoretical Computer Science (ENTCS)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Formal systems for cryptographic protocol analysis typically model cryptosystems in terms of free algebras. Modeling the behavior of a cryptosystem in terms of rewrite rules is more expressive, however, and there are some attacks that can only be discovered when rewrite rules are used. But free algebras are more efficient, and appear to be sound for ''most'' protocols. In [J. Millen, ''On the freedom of decryption'', Information Processing Letters 86 (6) (June 2003) 329-333] Millen formalizes this intuition for shared key cryptography and provides conditions under which it holds; that is, conditions under which security for a free algebra version of the protocol implies security of the version using rewrite rules. Moreover, these conditions fit well with accepted best practice for protocol design. However, he left public key cryptography as an open problem. In this paper, we show how Millen's approach can be extended to public key cryptography, giving conditions under which security for the free algebra model implies security for the rewrite rule model. As in the case for shared key cryptography, our conditions correspond to standard best practice for protocol design.