Computationally sound implementations of equational theories against passive adversaries

  • Authors:
  • Mathieu Baudet;Véronique Cortier;Steve Kremer

  • Affiliations:
  • LSV, CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan, France;Loria, CNRS UMR 7503 & INRIA Lorraine projet Cassis, France;LSV, CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan, France

  • Venue:
  • ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not consider a fixed set of primitives but aim at results for an arbitrary equational theory. We define a framework for comparing a cryptographic implementation and its idealization w.r.t. various security notions. In particular, we concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi. We present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, we establish new soundness results for the exclusive OR and a theory of ciphers and lists.