日本語
 
Help Privacy Policy ポリシー/免責事項
  詳細検索ブラウズ

アイテム詳細

登録内容を編集ファイル形式で保存
 
 
ダウンロード電子メール
  Inductive verification of cryptographic protocols based on message algebras

Cheikhrouhou, L. (2022). Inductive verification of cryptographic protocols based on message algebras. PhD Thesis, Universität des Saarlandes, Saarbrücken.

Item is

基本情報

表示: 非表示:
アイテムのパーマリンク: https://hdl.handle.net/21.11116/0000-000A-CEC1-4 版のパーマリンク: https://hdl.handle.net/21.11116/0000-000E-3386-1
資料種別: 学位論文
副タイトル : trace and indistinguishability properties

ファイル

表示: ファイル

関連URL

表示:
非表示:
説明:
-
OA-Status:
Green

作成者

表示:
非表示:
 作成者:
Cheikhrouhou, Lassaad1, 著者
Stephan, Werner1, 学位論文主査
Weidenbach, Christoph2, 監修者                 
所属:
1External Organizations, ou_persistent22              
2Automation of Logic, MPI for Informatics, Max Planck Society, ou_1116545              

内容説明

表示:
非表示:
キーワード: -
 要旨: Since 1981, a large variety of formal methods for the analysis of cryptographic protocols has evolved. In particular, the tool-supported inductive method has been applied to many protocols. Despite several improvements, the scope of these and other approaches is basically restricted to the simple enc-dec scenario (decryption reverts encryption) and to standard properties (confidentiality and authentication). In this thesis, we broaden the scope of the inductive method to protocols with algebraically specified cryptographic primitives beyond the simple enc-dec scenario and to indistinguishability properties like resistance against offline testing. We describe an axiomatization of message structures, justified by a rewriting-based model of algebraic equations, to provide complete case distinctions and partial orders thereby allowing for the definition of recursive functions and inductive reasoning. We develop a new proof technique for confidentiality properties based on tests of regular messages. The corresponding recursive functions are provably correct wrt. to an inductively defined attacker model. We introduce generic derivations to express indistinguishability properties. A central theorem then provides necessary and sufficient conditions that can be shown by standard trace properties. The general aspects of our techniques are thoroughly discussed and emphasized, along with two fully worked out real world case studies: PACE and TC-AMP are (to be) used for the German ID cards. To the best of our knowledge TC-AMP is among the most complex algebraically specified protocols that have been formally verified. In particular, we do not know of any approaches that apply formal analysis techniques to comparable cases.

資料詳細

表示:
非表示:
言語: eng - English
 日付: 2002-05-1920222022
 出版の状態: 出版
 ページ: 129 p.
 出版情報: Saarbrücken : Universität des Saarlandes
 目次: -
 査読: -
 識別子(DOI, ISBNなど): DOI: 10.22028/D291-36558
BibTex参照ID: Cheikhrouhou_2022
URN: nbn:de:bsz:291--ds-365586
その他: hdl:20.500.11880/33464
 学位: 博士号 (PhD)

関連イベント

表示:

訴訟

表示:

Project information

表示:

出版物

表示: