Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Hierarchical Combination of Intruder Theories

Identifieur interne : 005471 ( Main/Exploration ); précédent : 005470; suivant : 005472

Hierarchical Combination of Intruder Theories

Auteurs : Yannick Chevalier [France] ; Michaël Rusinowitch [France]

Source :

RBID : ISTEX:AE07493556FEBFBC753E05070A80B8E44E84C788

Descripteurs français

English descriptors

Abstract

Abstract: Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weaknesses, by a more accurate modelling of operators employed by protocols. Several works have shown how to handle a single algebraic operator (associated with a fixed intruder theory) or how to combine several operators satisfying disjoint theories. However several interesting equational theories, such as exponentiation with an abelian group law for exponents remain out of the scope of these techniques. This has motivated us to introduce a new notion of hierarchical combination for intruder theories and to show decidability results for the deduction problem in these theories. Under a simple hypothesis, we were able to simplify this deduction problem. This simplification is then applied to prove the decidability of constraint systems w.r.t. an intruder relying on exponentiation theory.

Url:
DOI: 10.1007/11805618_9


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Hierarchical Combination of Intruder Theories</title>
<author>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
</author>
<author>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:AE07493556FEBFBC753E05070A80B8E44E84C788</idno>
<date when="2006" year="2006">2006</date>
<idno type="doi">10.1007/11805618_9</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-73WNMMNW-G/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002932</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002932</idno>
<idno type="wicri:Area/Istex/Curation">002897</idno>
<idno type="wicri:Area/Istex/Checkpoint">001324</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001324</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Chevalier Y:hierarchical:combination:of</idno>
<idno type="wicri:Area/Main/Merge">005617</idno>
<idno type="wicri:source">INIST</idno>
<idno type="RBID">Pascal:07-0517948</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000390</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000643</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000378</idno>
<idno type="wicri:explorRef" wicri:stream="PascalFrancis" wicri:step="Checkpoint">000378</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Chevalier Y:hierarchical:combination:of</idno>
<idno type="wicri:Area/Main/Merge">005783</idno>
<idno type="wicri:Area/Main/Curation">005471</idno>
<idno type="wicri:Area/Main/Exploration">005471</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Hierarchical Combination of Intruder Theories</title>
<author>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>IRIT Université Paul Sabatier</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">France</country>
</affiliation>
</author>
<author>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>LORIA-INRIA-Lorraine</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">France</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Abelian group</term>
<term>Automatic proving</term>
<term>Cryptanalysis</term>
<term>Decidability</term>
<term>Equational theory</term>
<term>Exponentiation</term>
<term>Intruder</term>
<term>Modeling</term>
<term>Rewriting</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Cryptanalyse</term>
<term>Décidabilité</term>
<term>Démonstration automatique</term>
<term>Exponentiation</term>
<term>Groupe abélien</term>
<term>Intrus</term>
<term>Modélisation</term>
<term>Réécriture</term>
<term>Théorie équationnelle</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weaknesses, by a more accurate modelling of operators employed by protocols. Several works have shown how to handle a single algebraic operator (associated with a fixed intruder theory) or how to combine several operators satisfying disjoint theories. However several interesting equational theories, such as exponentiation with an abelian group law for exponents remain out of the scope of these techniques. This has motivated us to introduce a new notion of hierarchical combination for intruder theories and to show decidability results for the deduction problem in these theories. Under a simple hypothesis, we were able to simplify this deduction problem. This simplification is then applied to prove the decidability of constraint systems w.r.t. an intruder relying on exponentiation theory.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>France</li>
</country>
</list>
<tree>
<country name="France">
<noRegion>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
</noRegion>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michaël" last="Rusinowitch">Michaël Rusinowitch</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 005471 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 005471 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:AE07493556FEBFBC753E05070A80B8E44E84C788
   |texte=   Hierarchical Combination of Intruder Theories
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022