Deciding security of protocols against off-line guessing attacks

M Baudet - Proceedings of the 12th ACM conference on Computer …, 2005 - dl.acm.org
M Baudet
Proceedings of the 12th ACM conference on Computer and communications security, 2005dl.acm.org
We provide an effective procedure for deciding the existence of off-line guessing attacks on
security protocols, for a bounded number of sessions. The procedure consists of a constraint
solving algorithm for determining satisfiability and equivalence of a class of second-order E-
unification problems, where the equational theory E is presented by a convergent subterm
rewriting system. To the best of our knowledge, this is the first decidability result to use the
generic definition of off-line guessing attacks due to Corin et al. based on static equivalence …
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions.The procedure consists of a constraint solving algorithm for determining satisfiability and equivalence of a class of second-order E-unification problems, where the equational theory E is presented by a convergent subterm rewriting system.To the best of our knowledge, this is the first decidability result to use the generic definition of off-line guessing attacks due to Corin et al. based on static equivalence in the applied pi calculus.
ACM Digital Library