Rewriting in Protocol Verification
Stéphanie Delaune
Univ Rennes, CNRS, IRISA, France
Monday, June 29th, 2020
1/23
Rewriting in Protocol Verification Stphanie Delaune Univ Rennes, - - PowerPoint PPT Presentation
Rewriting in Protocol Verification Stphanie Delaune Univ Rennes, CNRS, IRISA, France Monday, June 29th, 2020 1/23 Cryptographic protocols everywhere ! Cryptographic protocols small programs designed to secure communication ( e.g.
Univ Rennes, CNRS, IRISA, France
1/23
2/23
2/23
3/23
3/23
3/23
3/23
3/23
3/23
(KE , KM)
(KE , KM)
get_challenge NP , KP NP NR , KR {NR, NP , KR}KE , MACKM ({NR, NP , KR}KE ) {NP, NR, KP}KE , MACKM ({NP, NR, KP }KE ) Kseed = KP ⊕ KR Kseed = KP ⊕ KR 4/23
5/23
?
5/23
6/23
7/23
8/23
8/23
8/23
9/23
9/23
9/23
9/23
10/23
?
11/23
?
11/23
?
11/23
?
11/23
?
11/23
12/23
13/23
E × Sℓ E | X · A1 = Y · A1}
E × Sℓ E | X · A2 = Y · A2}
13/23
14/23
14/23
?
14/23
?
14/23
?
14/23
15/23
i and ψ+ i
i ≈E2−i ψ+ i (with i = 1, 2)
15/23
16/23
?
17/23
?
17/23
?
?
17/23
?
?
17/23
18/23
18/23
19/23
19/23
20/23
?
20/23
?
20/23
n
21/23
n
21/23
n
21/23
22/23
22/23
23/23
23/23
23/23