Abstract
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this leads to decidability of secrecy. In this paper, we show that tagging schemes can be used to obtain decidability of secrecy even in the presence of unboundedly many nonces.
We thank the anonymous referees for detailed comments, which have helped to improve the presentation greatly, both in terms of the modelling and the proofs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Amadio, R.M., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions, INRIA Research Report 4147 (March 2001)
Blanchet, B., Podelski, P.: Verification of Cryptographic Protocols: Tagging Enforces Termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136–152. Springer, Heidelberg (2003)
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of firstorder logic and applications to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148–164. Springer, Heidelberg (2003)
Comon-Lundh, H., Cortier, V., Mitchell, J.C.: Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, p. 682. Springer, Heidelberg (2001)
Clark, J., Jacob, J.: A survey of authentication protocol literature (1997), Electronic version available at http://www.cs.york.ac.uk/~jac
Dolev, D., Even, S., Karp, R.M.: On the Security of Ping-Pong Protocols. Information and Control 55, 57–68 (1982)
Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: The undecidability of bounded security protocols. In: Proc. FMSP 1999 (1999)
Heather, J., Lowe, G., Schneider, S.: How to Prevent Type Flaw Attacks on Security Protocols. In: Proc. 13th IEEE CSFW, pp. 255–268 (2000)
Heintze, N., Tygar, D.: A model for secure protocols and their composition. IEEE Transactions on Software Engineering 22, 16–30 (1996)
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of computer security 7, 89–146 (1999)
Millen, J.K., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: Proc. ACM Conf. on Computer and Communications Security, pp. 166–175 (2001)
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of computer security 6, 85–128 (1998)
Ramanujam, R., Suresh, S.P.: A decidable subclass of unbounded security protocols. In: Gorrieri, R. (ed.) Proc. WITS 2003, April 2003, pp. 11–20 (2003)
Ramanujam, R., Suresh, S.P.: An equivalence on terms for security protocols. In: Bharadwaj, R. (ed.) Proc. AVIS 2003, April 2003, pp. 45–56 (2003)
Ramanujam, R., Suresh, S.P.: Decidability of secrecy for tagged protocols (September 2003), http://www.imsc.res.in/~jam
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: Proc. CSFW 14, pp. 174–190 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ramanujam, R., Suresh, S.P. (2003). Tagging Makes Secrecy Decidable with Unbounded Nonces as Well. In: Pandya, P.K., Radhakrishnan, J. (eds) FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. FSTTCS 2003. Lecture Notes in Computer Science, vol 2914. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24597-1_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-24597-1_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20680-4
Online ISBN: 978-3-540-24597-1
eBook Packages: Springer Book Archive