In this paper we study the protocol insecurity problem for time-dependent security protocols under the finite number of sessions' assumption, extending to the timed case, previous results obtained for the same problem in the untimed case. In particular, we propose a timed specification language, which allows to model temporal features typically involved in the implementation of security protocols. We introduce a stronger version of the Dolev-Yao intruder, by allowing it to generate new timestamps which can affect the execution of a protocol sensitive to their temporal validity. We prove that this temporal extension together with the increased power of the intruder model do not affect the complexity of the protocol insecurity problem, which remains NP-complete as in the untimed case.

Timed protocol insecurity problem is NP-complete / Benerecetti, Massimo; Peron, Adriano. - In: FUTURE GENERATION COMPUTER SYSTEMS. - ISSN 0167-739X. - 29:3(2013), pp. 843-862. [10.1016/j.future.2011.11.001]

Timed protocol insecurity problem is NP-complete

PERON, ADRIANO
2013-01-01

Abstract

In this paper we study the protocol insecurity problem for time-dependent security protocols under the finite number of sessions' assumption, extending to the timed case, previous results obtained for the same problem in the untimed case. In particular, we propose a timed specification language, which allows to model temporal features typically involved in the implementation of security protocols. We introduce a stronger version of the Dolev-Yao intruder, by allowing it to generate new timestamps which can affect the execution of a protocol sensitive to their temporal validity. We prove that this temporal extension together with the increased power of the intruder model do not affect the complexity of the protocol insecurity problem, which remains NP-complete as in the untimed case.
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11368/3029548
 Avviso

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact