On the automatic analysis of recursive security protocols with XOR

16Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently, first results on the decidability of the security of such protocols have been obtained. While recursive protocols often employ operators with algebraic, security relevant properties, such as the exclusive OR (XOR), the existing decision procedures, however, cannot deal with such operators and their properties. In this paper, we show that the security of recursive protocols with XOR is decidable (w.r.t. a bounded number of sessions) for a class of protocols in which recursive computations of principals are modeled by certain Horn theories. Interestingly, this result can be obtained by a reduction to the case without XOR. We also show that relaxing certain assumptions of our model lead to undecidability. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Küsters, R., & Truderung, T. (2007). On the automatic analysis of recursive security protocols with XOR. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4393 LNCS, pp. 646–657). Springer Verlag. https://doi.org/10.1007/978-3-540-70918-3_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free