Recursion versus replication in simple cryptographic protocols

  • Authors:
  • Hans Hüttel;Jiří Srba

  • Affiliations:
  • BRICS, Department of Computer Science, University of Aalborg, Aalborg East, Denmark;BRICS, Department of Computer Science, University of Aalborg, Aalborg East, Denmark

  • Venue:
  • SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of messages in the sense of Amadio, Lugiez and Vanackère. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable. Note: full proofs are available in [11].