SLIDE 27 Introduction Protocols with lists Generalized Horn Clauses From any length to length one An approximation algorithm Conclusion Remarks
Importance of Hypothesis
(1) A → B : {(a, a)}k (2) B → A : ({(b, b)}k, {s}f (a,b)) (3) A → C : {(a1, a′
1)}k, . . . , {(aN, a′ N)}k
(4) C → A : f (a1, a′
1), . . . , f (a1, a′ N), . . . , f (aN, a′ 1), . . . , f (aN, a′ N)
An attacker sends {(a, a)}k, {(b, b)}k to C as Message 3: he obtains f (a, b) by decomposition of the list f (a, a), f (a, b), f (b, a), f (b, b), decrypts {s}f (a,b) and obtains the secret s. However, if we consider only lists of one element, there is no attack. The generalized Horn clause for Message 4 is: att(list(i′ ≤ N, senc((xi′, yi′), k))) ⇒ att(list(i ≤ N, list(j ≤ N, f (xj, yi)))) In this clause, the Hypothesis 2 of our theorem is not satisfied, because the bound indices i and j have the same bound N.
Verification of Security Protocols with Lists:, from Length One to Unbounded Length 14 / 18