Advertisement

Finding Intruder Knowledge with Cap-Matching

  • Erin Hanna
  • Christopher LynchEmail author
  • David Jaz Myers
  • Corey Richardson
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11565)

Abstract

Given two terms s and t, a substitution \(\sigma \) matches s onto t if \(s\sigma = t\). We extend the matching problem to handle \(\mathbf{Cap }\)-terms, which are constructed of function symbols from the signature and a \(\mathbf{Cap }\) operator which represents an unbounded number of applications of function symbols from the signature to a set of \(\mathbf{Cap }\)-terms. A \(\mathbf{Cap }\)-term represents an infinite number of terms. A \(\mathbf{Cap }\)-substitution maps variables to \(\mathbf{Cap }\)-terms and represents an infinite number of term substitutions. \(\mathbf{Cap }\) matching is the problem of, given a term s and a \(\mathbf{Cap }\)-term T, find a set of \(\mathbf{Cap }\)-substitutions which represents the set of substitutions that matches s onto all the terms t represented by T. We give a sound, complete and terminating algorithm for \(\mathbf{Cap }\)-matching, which has been implemented in Maude. We show how the \(\mathbf{Cap }\)-matching problem can be used to find all the messages learnable by an active intruder in a cryptographic protocol, where the \(\mathbf{Cap }\) operator represents all the possible functions that can be performed by the intruder.

References

  1. 1.
    Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch M.: Cap unification: application to protocol security modulo homomorphic encryption. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, 13–16 April 2010, pp. 192–203 (2010)Google Scholar
  2. 2.
    Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 20–35. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-73449-9_4CrossRefGoogle Scholar
  3. 3.
    Baader, F., Snyder, W.: Unification theory. Handbook of Automated Reasoning, vol. 1, pp. 445–532. Elsevier, Amsterdam (2001)CrossRefGoogle Scholar
  4. 4.
    Comon, H., et al. Tree automata techniques and applications (2007). http://www.grappa.univ-lille3.fr/tata. Accessed 12 Oct 2007
  5. 5.
    Comon-Lundh, H., Cortier, V., Zalinescu, E.: Deciding security properties for cryptographic protocols. Application to key cycles. ACM Trans. Comput. Log. 11(2), 9 (2010)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Comon-Lundh, H., Delaune, S., Millen, J.: Constraint solving techniques and enriching the model with equational theories. Formal Models and Techniques for Analyzing Security Protocols, vol. 5, pp. 35–61. IOS Press, Amsterdam (2010)Google Scholar
  7. 7.
    Ganzinger, H., Hagen, G., Nieuwenhuis, R., Oliveras, A., Tinelli, C.: DPLL(T): fast decision procedures. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 175–188. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-27813-9_14CrossRefGoogle Scholar
  8. 8.
    Meadows, C.: The NRL protocol analysis tool: a position paper. In: Proceedings of 4th IEEE Computer Security Foundations Workshop - CSFW 1991, Franconia, NH, USA, 18–20 June 1991, p. 227 (1991)Google Scholar
  9. 9.
    Narendran, P., Marshall, A.M., Mahapatra, B.: On the complexity of the tiden-arnborg algorithm for unification modulo one-sided distributivity. In: Proceedings 24th International Workshop on Unification, UNIF 2010, Edinburgh, UK, 14th July 2010, pp. 54–63 (2010)Google Scholar
  10. 10.
    Reuß, A., Seidl, H.: Bottom-up tree automata with term constraints. In: Fermüller, C.G., Voronkov, A. (eds.) LPAR 2010. LNCS, vol. 6397, pp. 581–593. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-16242-8_41CrossRefGoogle Scholar
  11. 11.
    Robinson, J.A.: A machine-oriented logic based on the resolution principle. J. ACM (JACM) 12(1), 23–41 (1965)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Erin Hanna
    • 1
  • Christopher Lynch
    • 2
    Email author
  • David Jaz Myers
    • 3
  • Corey Richardson
    • 4
  1. 1.Department of MathematicsEastern UniversitySt. DavidsUSA
  2. 2.Department of Computer ScienceClarkson UniversityPotsdamUSA
  3. 3.Department of MathematicsJohns Hopkins UniversityBaltimoreUSA
  4. 4.O(1) LabsSan FranciscoUSA

Personalised recommendations