Logo eprints

Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation

Boreale, Michele and Buscemi, Maria Grazia Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. In: Proceedings of the 28th International Symposium on Mathematical Foundations of Computer Science (MFCS ’03). Lecture Notes in Computer Science, 2747 . Springer, pp. 269-278. ISBN 3-540-40671-9 (2003)

Full text not available from this repository.


Automatic methods developed so far for analysis of security protocols only model a limited set of cryptographic primitives (often, only encryption and concatenation) and from low-level features of cryptographic algorithms. This paper is an attempt towards closing this gap. We propose a symbolic technique and a decision method for analysis of protocols based on modular exponentiation, such as Diffie-Hellman key exchange. We introduce a protocol description language along with its semantics. Then, we propose a notion of symbolic execution and, based on it, a verification method. We prove that the method is sound and complete with respect to the language semantics.

Item Type: Book Section
Identification Number: 10.1007/978-3-540-45138-9_21
Additional Information: The final publication is available at www.springerlink.com
Funders: This work has been partially supported by EU within the FET - Global Computing initiative, projects MIKADO and PROFUNDIS and by MIUR project NAPOLI.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Research Area: Computer Science and Applications
Depositing User: Users 29 not found.
Date Deposited: 01 Mar 2011 10:03
Last Modified: 11 Jul 2011 14:33
URI: http://eprints.imtlucca.it/id/eprint/130

Actions (login required)

Edit Item Edit Item