Recursion vs. Replication in Simple Cryptographic Protocols
Authors | |
---|---|
Year of publication | 2005 |
Type | Article in Proceedings |
Conference | Proceedings of 31st Annual Conference on Current Trends in Theory and Practice of Informatics (SOFSEM'05) |
MU Faculty or unit | |
Citation | |
Field | Informatics |
Keywords | cryptographic protocols; recursion; replication; verification |
Description | We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable. |
Related projects: |