Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

International Conference on Computer Aided Verification

CAV 2013: Computer Aided Verification pp 708–723Cite as

  1. Home
  2. Computer Aided Verification
  3. Conference paper
Lengths May Break Privacy – Or How to Check for Equivalences with Length

Lengths May Break Privacy – Or How to Check for Equivalences with Length

  • Vincent Cheval18,
  • Véronique Cortier19 &
  • Antoine Plet19 
  • Conference paper
  • 3696 Accesses

  • 8 Citations

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 8044)

Abstract

Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes. While some decision procedures have been proposed for automatically deciding process equivalence, all existing approaches abstract away the information an attacker may get when observing the length of messages.

In this paper, we study process equivalence with length tests. We first show that, in the static case, almost all existing decidability results (for static equivalence) can be extended to cope with length tests. In the active case, we prove decidability of trace equivalence with length tests, for a bounded number of sessions and for standard primitives. Our result relies on a previous decidability result from Cheval et al [15] (without length tests). Our procedure has been implemented and we have discovered a new flaw against privacy in the biometric passport protocol.

Keywords

  • Decision Procedure
  • Equational Theory
  • Security Protocol
  • Length Function
  • Blind Signature

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work has been partially supported by the European Research Council under the European Union’s Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement no 258865, project ProSecure and project JCJC VIP no 11 JS02 006 01.

Download conference paper PDF

References

  1. Machine readable travel document. Technical Report 9303, International Civil Aviation Organization (2008)

    Google Scholar 

  2. Abadi, M., Blanchet, B., Fournet, C.: Just fast keying in the pi calculus. ACM Transactions on Information and System Security (TISSEC) 10(3), 1–59 (2007)

    CrossRef  Google Scholar 

  3. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2–32 (2006)

    CrossRef  MathSciNet  Google Scholar 

  4. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symp. on Principles of Programming Languages (POPL 2001) (2001)

    Google Scholar 

  5. Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied pi calculus. In: 23rd IEEE Computer Security Foundations Symposium (CSF 2010) (2010)

    Google Scholar 

  6. Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  7. Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: 25th IEEE Computer Security Foundations Symposium (CSF 2012) (2012)

    Google Scholar 

  8. Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: 12th Conference on Computer and Communications Security (CCS 2005) (2005)

    Google Scholar 

  9. Berrima, M., Ben Rajeb, N., Cortier, V.: Deciding knowledge in security protocols under some e-voting theories. Theoretical Informatics and Applications (RAIRO-ITA) 45, 269–299 (2011)

    CrossRef  MathSciNet  MATH  Google Scholar 

  10. Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th Computer Security Foundations Workshop (CSFW 2001) (2001)

    Google Scholar 

  11. Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3–51 (2008)

    CrossRef  MathSciNet  MATH  Google Scholar 

  12. Chadha, R., Ciobâcă, Ş., Kremer, S.: Automated verification of equivalence properties of cryptographic protocols. In: 21th European Symposium on Programming (ESOP 2012) (2012)

    Google Scholar 

  13. Cheval, V.: Automatic verification of cryptographic protocols: privacy-type properties. Phd thesis, ENS Cachan, France (2012)

    Google Scholar 

  14. Cheval, V.: APTE (Algorithm for Proving Trace Equivalence) (2013), http://projects.lsv.ens-cachan.fr/APTE/

  15. Cheval, V., Comon-Lundh, H., Delaune, S.: Trace equivalence decision: Negative tests and non-determinism. In: 18th ACM Conference on Computer and Communications Security (CCS 2011) (2011)

    Google Scholar 

  16. Comon-Lundh, H., Cortier, V.: Computational soundness of observational equivalence. In: 15th Conf. on Computer and Communications Security (CCS 2008) (2008)

    Google Scholar 

  17. Cortier, V., Delaune, S.: A method for proving observational equivalence. In: 22nd IEEE Computer Security Foundations Symposium (CSF 2009) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. School of Computer Science, University of Birmingham, UK

    Vincent Cheval

  2. LORIA, CNRS, France

    Véronique Cortier & Antoine Plet

Authors
  1. Vincent Cheval
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Véronique Cortier
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Antoine Plet
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. University of Lugano, 6900, Lugano, Switzerland

    Natasha Sharygina

  2. University of Technology, 1040, Vienna, Austria

    Helmut Veith

Rights and permissions

Reprints and Permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cheval, V., Cortier, V., Plet, A. (2013). Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: Sharygina, N., Veith, H. (eds) Computer Aided Verification. CAV 2013. Lecture Notes in Computer Science, vol 8044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39799-8_50

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-39799-8_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39798-1

  • Online ISBN: 978-3-642-39799-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.212

Not affiliated

Springer Nature

© 2023 Springer Nature