×

Hierarchical combination of intruder theories. (English) Zbl 1151.68630

Pfenning, Frank (ed.), Term rewriting and applications. 17th international conference, RTA 2006, Seattle, WA, USA, August 12–14, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-36834-2/pbk). Lecture Notes in Computer Science 4098, 108-122 (2006).
Summary: Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weaknesses, by a more accurate modelling of operators employed by protocols. Several works have shown how to handle a single algebraic operator (associated with a fixed intruder theory) or how to combine several operators satisfying disjoint theories. However several interesting equational theories, such as exponentiation with an abelian group law for exponents remain out of the scope of these techniques. This has motivated us to introduce a new notion of hierarchical combination for intruder theories and to show decidability results for the deduction problem in these theories. Under a simple hypothesis, we were able to simplify this deduction problem. This simplification is then applied to prove the decidability of constraint systems w.r.t. an intruder relying on exponentiation theory.
For the entire collection see [Zbl 1113.68009].

MSC:

68T15 Theorem proving (deduction, resolution, etc.) (MSC2010)
94A60 Cryptography