Analyzing Protocols that use Modular Exponentiation: Semantic Unification

  • Authors:
  • Deepak Kapur;Paliath Narendran;lida Wang

  • Affiliations:
  • -;-;-

  • Venue:
  • Analyzing Protocols that use Modular Exponentiation: Semantic Unification
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Multiplication and exponentiation modulo a prime are common operations in modern cryptography. Unification problems modulo some equational theories that these operations satisfy are investigated. The algorithms for some of these unification problems are expected to be integrated into Naval Research Lab.''s Protocol Analyzer (NPA), a tool developed by Catherine Meadows, which has been successfully used to analyze cryptographic protocols, particularly emerging standards such as the Internet Engineering Task Force''s (IETF) Internet Key Exchange [11] and Group Domain of Interpretation [12] protocols. Currently, for equational unification, NPA uses narrowing procedures which work only for terminating and confluent rewrite systems. Given that modular multiplication is associative and commutative, NPA cannot be effectively applied for protocols that use these operations. Two different but related equational theories are analyzed here. A unification algorithm is given for one of the theories which relies on solving syzygies over multivariate integral polynomials with noncommuting indeterminates. For the other theory, in which the distributivity property of exponentiation over multiplication is assumed, the unifiability problem is shown to be undecidable by adapting a construction developed by one of the authors to reduce Hilbert''s 10th problem to the solvability problem for linear equations over semi-rings. A new algorithm for computing strong \Groebner\ basis of right ideals over the polynomial ring Z is proposed; unlike earlier algorithms proposed by Baader as well as by Madlener and Reinert which work only for right admissible term orderings with the boundedness property, this algorithm works for {\em any\/} right admissible term ordering. Techniques from several different fields -- particularly symbolic computation (ideal theory and \Groebner\ basis algorithms) and unification theory --- are used to address problems arising in state-based cryptographic protocol analysis.