skip to main content
10.1145/1755688.1755713acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Cap unification: application to protocol security modulo homomorphic encryption

Published: 13 April 2010 Publication History

Abstract

We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and the intruder abilities as an equational theory. The problem of active intrusion -- such as whether a secret term can be derived, possibly via interaction with the honest participants of the protocol -- is then formulated as a Cap Unification problem. Cap Unification is an extension of Equational Unification: look for a cap to be placed on a given set of terms, so as to unify it with a given term modulo the equational theory. We give a decision procedure for Cap Unification, when the intruder capabilities are modeled as homomorphic encryption theory. Our procedure can be employed in a simple manner to detect attacks exploiting some properties of block ciphers.

References

[1]
S. Anantharaman, P. Narendran, M. Rusinowitch. "Intruders with Caps". In Proc. of Int. Conf. RTA'07, LNCS 4533, pp. 20--35, Springer-Verlag, June 2007.
[2]
S. Anantharaman, H. Lin, C. Lynch, P. Narendran, M. Rusinowitch. "Unification modulo Homomorphic Encryption". In Proc. of Int. Conf. FROCOS 2009, TRENTO-Italy, LNAI 5749, pp. 100--116, Springer-Verlag, September 2009.
[3]
A. Armando, L. Compagna. "SATMC: A SAT-based Model Checker for Security Protocols". In Proc. of JELIA 2004, LNCS 3229, pp. 730--733, Springer-Verlag, 2004.
[4]
D. Basin, S. Mödersheim, L. Viganó. "An On-The-Fly Model-Checker for Security Protocol Analysis". In Proc. of ESORICS'03, LNCS 2808, pp. 253--270. Springer-Verlag, 2003.
[5]
M. Baudet. "Deciding security of protocols against off-line guessing attacks". In Proc. of ACM Conf. on Computer and Communications Security, pp. 16--25, 2005.
[6]
Y. Chevalier, M. Kourjieh. "Key Substitution in the Symbolic Analysis of Cryptographic Protocols". In Proc. Int. Conf FSTTCS'07, LNCS 4855, pp. 121--132, Springer-Verlag, December 2007.
[7]
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani. "An NP Decision Procedure for Protocol Insecurity with XOR". In Proc. of the Logic In Computer Science Conference, LICS'03, pp. 261--270, 2003.
[8]
H. Comon-Lundh, R. Treinen. "Easy Intruder Deductions." Verification: Theory and Practice In LNCS 2772, pp. 225--242, Springer-Verlag, February 2004.
[9]
V. Cortier, S. Delaune, P. Lafourcade. "A Survey of Algebraic Properties Used in Cryptographic Protocols". In Journal of Computer Security 14(1): 1--43, 2006.
[10]
V. Cortier, M. Rusinowitch, E. Zalinescu. "A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures". In Proc. of the 7th ACM SIGPLAN Symposium PPDP 2005, pp. 12--22.
[11]
S. Delaune, F. Jacquemard. "A decision procedure for the verification of security protocols with explicit destructors". In Proc. of the 11th ACM Conference on Computer and Communications Security (CCS'04), pp. 278--287, Washington, D.C., USA, October 2004. ACM Press.
[12]
S. Delaune, P. Lafourcade, D. Lugiez, R. Treinen, "Symbolic protocol analysis for monoidal equational theories." In Information and Computation 206(2--4), pp. 312--351, 2008.
[13]
S. Escobar, C. Meadows, J. Meseguer. "A Rewriting-Based Inference System for the NRL Protocol Analyzer and its Meta-Logical Properties." In Theoretical Computer Science, Vol. 367(1--2), pp. 162--202, 2006.
[14]
F. J.-T. Fabrega, J. C. Herzog, J. D. Guttman. "Strand Spaces: Why is a Security Protocol Correct?" In Proc. of IEEE Symposium on Security and Privacy, May 1998.
[15]
J. M. Hullot. "Canonical Forms and Unification". In Proc. of the Int. Conf. on Automated Deduction CADE-5, LNCS 87, pp. 318--334, Springer-Verlag, 1980.
[16]
S. Kremer, M. D. Ryan. "Analysing the vulnerability of protocols to produce known-pair and chosen-text attacks". In Proc. of the 2nd Int. Workshop on Security Issues in Coordination Models, Languages, and Systems (SecCo 2004), ENTCS, Vol. 128, Issue 5, pp. 87--104, 2004.
[17]
C. Meadows, P. Narendran. "A unification algorithm for the group Diffie-Hellman protocol". In Workshop on Issues in the Theory of Security (in conjunction with POPL'02), Portland, Oregon, USA, January 14--15, 2002.
[18]
J. Millen, V. Shmatikov. "Constraint Solving for Bounded-Process Cryptographic Protocol Analysis" In Proc. of the 8th ACM Conference on Computer and Communications Security pp. 166--175, 2001.
[19]
E. Tiden, S. Arnborg. "Unification Problems with One-sided Distributivity". In J. of Symb. Computation 3(1--2): 183--202, 1987.
[20]
C. Weidenbach. "Towards an automatic analysis of security protocols". In Proc. of the 16th Int. Conf. on Automated Deduction, CADE-16, LNAI 1632, pp. 378--382, Springer-Verlag, 1999.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
April 2010
363 pages
ISBN:9781605589367
DOI:10.1145/1755688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. protocol
  2. rewriting
  3. secrecy analysis
  4. unification

Qualifiers

  • Research-article

Funding Sources

Conference

ASIA CCS '10
Sponsor:

Acceptance Rates

ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media