Skip to main content

Lengths May Break Privacy − Or How to Check for Equivalences with Length

Vincent Cheval‚ Véronique Cortier and Antoine Plet

Abstract

Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes. While some decision procedures have been proposed for automatically deciding process equivalence, all existing approaches abstract away the information an attacker may get when observing the length of messages. In this paper, we study process equivalence with length tests. We first show that, in the static case, almost all existing decidability results (for static equivalence) can be extended to cope with length tests. In the active case, we prove decidability of trace equivalence with length tests, for a bounded number of sessions and for standard primitives. Our result relies on a previous decidability result from Cheval et al (without length tests). Our procedure has been implemented and we have discovered a new flaw against privacy in the biometric passport protocol.

Book Title
Computer Aided Verification − 25th International Conference‚ CAV 2013‚ Saint Petersburg‚ Russia‚ July 13−19‚ 2013. Proceedings
Editor
Natasha Sharygina and Helmut Veith
Pages
708–723
Publisher
Springer
Series
Lecture Notes in Computer Science
Volume
8044
Year
2013