Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes
2017 IEEE 30th Computer Security Foundations Symposium (CSF) (2017)
Santa Barbara, California, USA
Aug. 21, 2017 to Aug. 25, 2017
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CSF.2017.32
We introduce a new class of security protocols with an unbounded number of sessions and unlimited fresh data for which the problem of secrecy is decidable. The only constraint we place on the class is a notion of depthboundedness. Precisely we prove that, restricted to messages of up to a given size, secrecy is decidable for all depthbounded processes. This decidable fragment of security protocols captures many real-world symmetric key protocols, including Needham-Schroeder Symmetric Key, Otway-Rees, and Yahalom.
Protocols, Cryptography, Calculus, Standards, Manganese, Syntactics
E. DOsualdo, L. Ong and A. Tiu, "Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes," 2017 IEEE 30th Computer Security Foundations Symposium (CSF), Santa Barbara, California, USA, 2017, pp. 464-480.