In the study of symbolic verification of cryptographic protocols, a central result due to Rusinowitch and Turuani [2003] is that the insecurity problem (deciding whether a protocol admits an execution which leaks a designated secret to the intruder) for security protocols with finitely many sessions is NP-complete. Central to their proof strategy is the observation that any execution of a protocol can be simulated by one where the intruder only communicates terms of bounded size. They prove this by analyzing how variables used in the protocol can be instantiated in different contexts by the intruder. However, when we consider protocols where, in addition to terms, some logical statements or "assertions" about the terms (as presented by Ramanujam, Sundararajan, and Suresh [2017]) are also communicated, the analysis of the insecurity problem becomes tricky. In this paper we consider the insecurity problem for protocols with a class of assertions that includes equality on terms and existential quantification. The intruder can potentially exploit the fact that witnesses for existential quantifiers may be unbounded, and obtaining small witness terms while maintaining equality proofs complicates the analysis considerably. We use a notion of well-typed equality proofs that helps in bounding the sizes of the terms involved, and show that the insecurity problem for assertions is in NP.
翻译:在对加密规程进行象征性核查的研究中,鲁西诺开关和图鲁阿尼[2003年]的一个核心结果是,安全问题(协议是否承认对入侵者泄露指定秘密的某种执行,但协议是否允许对安全规程进行有限的保密)是NP不完整的。他们的证据战略的核心是,任何议定书的执行都可以由入侵者只传达约束性大小条件的规程来模拟,它们通过分析协议中使用的变量如何被入侵者在不同情况下即刻激活证明了这一点。然而,当我们考虑协议时,除了术语外,还传达了某些逻辑性声明或“保证”关于安全规程的条款(如Ramanujam、Sundararajan和Suresh[2017]提出的)是否被执行的问题,对不安全问题的分析就变得棘手了。在本文中,我们考虑规程的不安全问题有某种说法,其中包括条件平等和生存量化。入侵者有可能利用证人可能不受约束的事实,在维持平等证据的同时获得少量的证人条款,同时维持平等性证据,同时使分析变得相当复杂。我们使用这种安全条款类型来证明。