Skip to main content

Tagging Makes Secrecy Decidable with Unbounded Nonces as Well

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2914))

Abstract

Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this leads to decidability of secrecy. In this paper, we show that tagging schemes can be used to obtain decidability of secrecy even in the presence of unboundedly many nonces.

We thank the anonymous referees for detailed comments, which have helped to improve the presentation greatly, both in terms of the modelling and the proofs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amadio, R.M., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions, INRIA Research Report 4147 (March 2001)

    Google Scholar 

  2. Blanchet, B., Podelski, P.: Verification of Cryptographic Protocols: Tagging Enforces Termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136–152. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Comon-Lundh, H., Cortier, V.: New decidability results for fragments of firstorder logic and applications to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148–164. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Comon-Lundh, H., Cortier, V., Mitchell, J.C.: Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, p. 682. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Clark, J., Jacob, J.: A survey of authentication protocol literature (1997), Electronic version available at http://www.cs.york.ac.uk/~jac

  6. Dolev, D., Even, S., Karp, R.M.: On the Security of Ping-Pong Protocols. Information and Control 55, 57–68 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  7. Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: The undecidability of bounded security protocols. In: Proc. FMSP 1999 (1999)

    Google Scholar 

  8. Heather, J., Lowe, G., Schneider, S.: How to Prevent Type Flaw Attacks on Security Protocols. In: Proc. 13th IEEE CSFW, pp. 255–268 (2000)

    Google Scholar 

  9. Heintze, N., Tygar, D.: A model for secure protocols and their composition. IEEE Transactions on Software Engineering 22, 16–30 (1996)

    Article  Google Scholar 

  10. Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of computer security 7, 89–146 (1999)

    Google Scholar 

  11. Millen, J.K., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: Proc. ACM Conf. on Computer and Communications Security, pp. 166–175 (2001)

    Google Scholar 

  12. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of computer security 6, 85–128 (1998)

    Google Scholar 

  13. Ramanujam, R., Suresh, S.P.: A decidable subclass of unbounded security protocols. In: Gorrieri, R. (ed.) Proc. WITS 2003, April 2003, pp. 11–20 (2003)

    Google Scholar 

  14. Ramanujam, R., Suresh, S.P.: An equivalence on terms for security protocols. In: Bharadwaj, R. (ed.) Proc. AVIS 2003, April 2003, pp. 45–56 (2003)

    Google Scholar 

  15. Ramanujam, R., Suresh, S.P.: Decidability of secrecy for tagged protocols (September 2003), http://www.imsc.res.in/~jam

  16. Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: Proc. CSFW 14, pp. 174–190 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ramanujam, R., Suresh, S.P. (2003). Tagging Makes Secrecy Decidable with Unbounded Nonces as Well. In: Pandya, P.K., Radhakrishnan, J. (eds) FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. FSTTCS 2003. Lecture Notes in Computer Science, vol 2914. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24597-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24597-1_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20680-4

  • Online ISBN: 978-3-540-24597-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics