Handling exp, χ (and timestamps) in protocol analysis

  • Authors:
  • Roberto Zunino;Pierpaolo Degano

  • Affiliations:
  • Dipartimento di Informatica, Università di Pisa, Italy;Dipartimento di Informatica, Università di Pisa, Italy

  • Venue:
  • FOSSACS'06 Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus. Rather than assuming a specific, fixed set of cryptographic primitives, we only require them to be specified through a term rewriting system, with no restrictions. Examples are provided to support our analysis. First, we tackle forward secrecy for a Diffie-Hellman-based protocol involving exponentiation, multiplication and inversion. Then, a simplified version of Kerberos is analyzed, showing that its use of timestamps succeeds in preventing replay attacks.