Multiset Rewriting and the Complexity of Bounded Protocols - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Multiset Rewriting and the Complexity of Bounded Protocols

Description:

Nancy Durgin, Patrick Lincoln, John Mitchell, Andre Scedrov. Supported by ONR MURI ... quantification (MSR) Cervesato, Durgin, Lincoln, Mitchell, Scedrov CSFW'99 ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 16
Provided by: johncmi4
Category:

less

Transcript and Presenter's Notes

Title: Multiset Rewriting and the Complexity of Bounded Protocols


1
Multiset Rewriting and the Complexity of Bounded
Protocols
  • Nancy Durgin, Patrick Lincoln, John
    Mitchell, Andre Scedrov
  • Supported by ONR MURI

2
Common Intruder Model
  • Derived from positions taken in Needham-Schroeder
    1978 and Dolev-Yao 1983
  • Idealization that makes protocol analysis
    palatable
  • Adversary is nondeterministic process
  • Adversary can
  • Block network traffic
  • Read any message, decompose into parts
  • Decrypt if key is known to adversary
  • Insert new message from data it has observed
  • Adversary cannot
  • Gain partial knowledge
  • Guess part of a key
  • Perform statistical tests

3
Accomplishments
  • Developed an extension of multiset rewriting with
    existential quantification (MSR)
    Cervesato, Durgin, Lincoln, Mitchell, Scedrov
    CSFW99
  • Relationship to strand spaces Guttman et al.
    Cervesato, Durgin, Lincoln, Mitchell, Scedrov
    CSFW00
  • Representations of MSR and strands in linear
    logic
  • Cervesato, Durgin, Kanovich, Scedrov FMCS00
  • MSR extension with disequality testing decision
    problems and complexity
    Durgin, Lincoln, Mitchell, Scedrov

4
Roadmap
  • Overview of
  • MSR
  • Extension with x y , x ? y
  • Decision problems and complexity

5
MSR Protocol Notation
  • Non-deterministic infinite-state systems
  • Facts
  • F P(t1, , tn)
  • t x c f(t1, , tn)
  • States F1, ..., Fn
  • Multiset of facts
  • Includes network messages, private state
  • Intruder will see messages, not private state
  • Multiset allows duplicated messages, states

Multi-sorted first-order atomic formulas
6
State Transitions in MSR
  • Transition rule
  • F1, , Fk ?? ?x1 ?xm. G1, , Gn
  • What this means
  • If F1, , Fk in state ?, then a next state ? has
  • Facts F1, , Fk removed
  • G1, , Gn added, with x1 xm replaced by new
    symbols
  • Other facts in state ? carry over to ?
  • Free variables in rule universally quantified

7
Formalize Intruder Model
  • Intercept, decompose and remember messages
  • N1(x) ?? M(x) N2(x,y) ??
    M(x), M(y)
  • N3(x) ?? M(x)
  • Compose and send messages from known data
  • M(x) ?? N1(x), M(x)
  • M(x), M(y) ?? N2(x,y), M(x), M(y)
  • M(x) ?? N3(x), M(x)
  • Generate new data as needed
  • ?x. M(x)
  • Highly nondeterministic, same for any
    protocol

8
Protocol theory
  • Initialization theory
  • Describes initial conditions such as key
    generation or other shared information
  • Role generation theory
  • Designates possibly multiple roles that each
    participant may play (such as initiator,
    responder, client, or server)
  • Agent theory
  • Disjoint union of bounded subtheories that each
    characterize a possible role

9
Testing for a b , c ? d
  • x ? y atomic
  • Conditional transition rule
  • a1b1, , aibi, c1 ? d1 , , cj ? dj
    F1, , Fk

  • ?? ?x1 ?xm. G1, , Gn
  • What this means
  • If F1, , Fk in state ?, and if a1b1, ,
    aibi,
  • c1 ? d1 , , cj ? dj are true, then a next
    state ? has
  • Facts F1, , Fk removed
  • G1, , Gn added, with x1 xm replaced by new
    symbols
  • Other facts in state ? carry over to ?
  • Free variables in rule universally quantified

10
Complexity of Protocol Secrecy
  • Bounded Roles Unbounded
    Roles

  • Bdd ? Unbdd ?
  • I with ? ? NP undec
    undec
  • NP DEXP
    undec
  • I w/o ? ? NP DEXP
    undec
  • NP DEXP
    undec


11
Undecidability
  • Bounded Roles Unbounded
    Roles

  • Bdd ? Unbdd ?
  • I with ? ? NP undec
    undec
  • NP DEXP
    undec
  • I w/o ? ? NP DEXP
    undec
  • NP DEXP
    undec


12
Set membership tester
  • Linked list of protocol roles
  • Each role takes a value as input and compares the
    received value to its internal value
  • If the values not the same, forward the received
    value to the next role in the chain
  • At the end of the chain, a new TM tape cell can
    be created with a value known to be new

13
Conclusions
  • Extension of MSR with equality and disequality
    testing
  • Secrecy undecidable even for protocols that do
    not generate fresh nonces
  • Secrecy NP-complete if the number of roles is
    fixed

14
Modeling Perfect Encryption
  • Encryption functions and keys
  • For public-key encryption
  • two key sorts e_key, d_key
  • predicate Key_pair(e_key, d_key)
  • Functions
  • enc e_key ? msg -gt msg
  • dec d_key ? msg -gt msg (implicit in
    pattern-matching)
  • Properties of this model
  • Encrypt, decrypt only with appropriate keys
  • Only produce enc(key, msg) from key and msg
    (!!!)
  • This is not true for some encryption functions

15
Intruder Encryption Capabilities
  • Intruder can encrypt with encryption key
  • Me(k), Mdata(x) ?? Ni(enc(k,x)), Me(k), Mdata(x)
  • Intruder can decrypt with decryption key
  • Nj(enc(k,x)),Key_pair(k,k), Md(k), ?? Mdata(x),
    ...
  • Add to previous intruder model
  • Assumes sorts data, e_key, d_key with
    typed
  • predicates Mdata(data), Me(e_key),
    Md(d_key)
Write a Comment
User Comments (0)
About PowerShow.com