Skip to main content

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Vincent Cheval‚ Steve Kremer and Itsaka Rakotonirina

Abstract

Verification of privacy-type properties for cryptographic protocols in an active adversarial environment, modelled as a behavioural equivalence in concurrent-process calculi, exhibits a high computational complexity. While undecidable in general, for some classes of common cryptographic primitives the problem is coNEXP-complete when the number of honest participants is bounded.

In this paper we develop optimisation techniques for verifying equivalences, exploiting symmetries between the two processes under study. We demonstrate that they provide a significant (several orders of magnitude) speed-up in practice, thus increasing the size of the protocols that can be analysed fully automatically.

Book Title
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security‚ CCS 2019‚ London‚ UK‚ November 11−15‚ 2019
Editor
Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz
Pages
905–922
Publisher
ACM
Year
2019