Asymmetric unification: a new unification paradigm for cryptographic protocol analysis

  • Authors:
  • Serdar Erbatur;Santiago Escobar;Deepak Kapur;Zhiqiang Liu;Christopher A. Lynch;Catherine Meadows;José Meseguer;Paliath Narendran;Sonia Santiago;Ralf Sasse

  • Affiliations:
  • Università degli Studi di Verona, Italy;DSIC-ELP, Universitat Politècnica de València, Spain;University of New Mexico, Albuquerque, NM;Clarkson University, Potsdam, NY;Clarkson University, Potsdam, NY;Naval Research Laboratory, Washington, DC;University of Illinois, Urbana-Champaign;University at Albany-SUNY, Albany, NY;DSIC-ELP, Universitat Politècnica de València, Spain;Institute of Information Security, ETH Zurich, Switzerland

  • Venue:
  • CADE'13 Proceedings of the 24th international conference on Automated Deduction
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a new paradigm for unification arising out of a technique commonly used in cryptographic protocol analysis tools that employ unification modulo equational theories. This paradigm relies on: (i) a decomposition of an equational theory into (R,E) where R is confluent, terminating, and coherent modulo E, and (ii) on reducing unification problems to a set of problems $s =_{}^{?} t$ under the constraint that t remains R/E-irreducible. We call this method asymmetric unification. We first present a general-purpose generic asymmetric unification algorithm. and then outline an approach for converting special-purpose conventional unification algorithms to asymmetric ones, demonstrating it for exclusive-or with uninterpreted function symbols. We demonstrate how asymmetric unification can improve performanceby running the algorithm on a set of benchmark problems. We also give results on the complexity and decidability of asymmetric unification.