Skip to main content
Top

2021 | OriginalPaper | Chapter

Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems

Authors : Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Brandon Rozek

Published in: Frontiers of Combining Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Automated methods can be used to generate cryptosystems by combining the primitives in an arbitrary fashion, to weed out insecure cryptosystems, and to prove the security of those that survive. In this paper, we study several algorithmic problems arising from the verification of automatically synthesized cryptosystems built from block ciphers, in a theory that includes ACUN. One of these is static equivalence to an algorithm that produces a sequence of random terms. The other is invertibility, the problem of determining whether, given an automatically synthesized cryptosystem, built from block ciphers, and the ability to compute inverses, is it always possible to compute the original plaintext from the ciphertext? We show that static equivalence to random in this theory is undecidable in general. In addition, we identify a reasonable special case for which there is a decidable condition implying security, along with an algorithm for verifying it. For invertibility, we identify a reasonable class of cryptosystems for which invertibility is equivalent to a simple syntactic condition that can be easily verified.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoret. Comput. Sci. 367(1–2), 2–32 (2006)MathSciNetCrossRef Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoret. Comput. Sci. 367(1–2), 2–32 (2006)MathSciNetCrossRef
2.
3.
go back to reference Borgström, J.: Static equivalence is harder than knowledge. In: Baeten, J.C.M., Phillips, I.C.C. (eds.) Proceedings of the 12th Workshop on Expressiveness on Concurrency, EXPRESS 2005, San Francisco, CA, USA, 27 August 2005, pp. 45–57. Electronic Notes in Theoretical Computer Science, Elsevier (2005). https://doi.org/10.1016/j.entcs.2006.05.006 Borgström, J.: Static equivalence is harder than knowledge. In: Baeten, J.C.M., Phillips, I.C.C. (eds.) Proceedings of the 12th Workshop on Expressiveness on Concurrency, EXPRESS 2005, San Francisco, CA, USA, 27 August 2005, pp. 45–57. Electronic Notes in Theoretical Computer Science, Elsevier (2005). https://​doi.​org/​10.​1016/​j.​entcs.​2006.​05.​006
5.
go back to reference Hoang, V.T., Katz, J., Malozemoff, A.J.: Automated analysis and synthesis of authenticated encryption schemes. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 84–95. Association for Computing Machinery, New York (2015). https://doi.org/10.1145/2810103.2813636 Hoang, V.T., Katz, J., Malozemoff, A.J.: Automated analysis and synthesis of authenticated encryption schemes. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 84–95. Association for Computing Machinery, New York (2015). https://​doi.​org/​10.​1145/​2810103.​2813636
9.
go back to reference Malozemoff, A.J., Katz, J., Green, M.D.: Automated analysis and synthesis of block-cipher modes of operation. In: 2014 IEEE 27th Conference on Computer Security Foundations Symposium (CSF), pp. 140–152. IEEE (2014) Malozemoff, A.J., Katz, J., Green, M.D.: Automated analysis and synthesis of block-cipher modes of operation. In: 2014 IEEE 27th Conference on Computer Security Foundations Symposium (CSF), pp. 140–152. IEEE (2014)
Metadata
Title
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems
Authors
Hai Lin
Christopher Lynch
Andrew M. Marshall
Catherine A. Meadows
Paliath Narendran
Veena Ravishankar
Brandon Rozek
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-86205-3_14

Premium Partner