Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures

  • Authors:
  • Yannick Chevalier;Michael Rusinowitch

  • Affiliations:
  • IRIT, Team LiLac, Université Paul Sabatier, Toulouse, France;LoriaINRIA Lorraine, Cassis Project, Nancy, France

  • Venue:
  • Theoretical Computer Science
  • Year:
  • 2010

Quantified Score

Hi-index 5.23

Visualization

Abstract

Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples of such sets of operators comprise XOR, multiplication, abstract encryption/decryption. In this report we give an algorithm for combining decision procedures for arbitrary intruder theories with disjoint sets of operators, provided that solvability of ordered intruder constraints, a slight generalization of intruder constraints, can be decided in each theory. This is the case for most of the intruder theories for which a decision procedure has been given. In particular our result allows us to decide trace-based security properties of protocols that employ any combination of the above mentioned operators with a bounded number of sessions.