Skip to main content

Automating Security Analysis: Symbolic Equivalence of Constraint Systems

Vincent Cheval‚ Hubert Comon−Lundh and Stéphanie Delaune

Abstract

We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence.

Book Title
Automated Reasoning‚ 5th International Joint Conference‚ IJCAR 2010‚ Edinburgh‚ UK‚ July 16−19‚ 2010. Proceedings
Editor
Jürgen Giesl and Reiner Hähnle
Pages
412–426
Publisher
Springer
Series
Lecture Notes in Computer Science
Volume
6173
Year
2010