Regular protocols and attacks with regular knowledge

  • Authors:
  • Tomasz Truderung

  • Affiliations:
  • LORIA-INRIA-Lorraine, France, Institute of Computer Science, Wrocław University, Poland

  • Venue:
  • CADE' 20 Proceedings of the 20th international conference on Automated Deduction
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic keys for a bounded number of sessions is NP-complete. We prove also that if regural languages (given by tree automata) are used in protocol descriptions to restrict the form of messages, then the insecurity problem is NexpTime-complete. Furthermore, we define a class of cryptographic protocols, called regular protocols, such that the knowledge which the intruder can gain during an unlimited number of sessions of a protocol is a regular language.