In this paper we study the protocol insecurity problem for time-dependent security protocols under the finite number of sessions' assumption, extending to the timed case, previous results obtained for the same problem in the untimed case. In particular, we propose a timed specification language, which allows to model temporal features typically involved in the implementation of security protocols. We introduce a stronger version of the Dolev-Yao intruder, by allowing it to generate new timestamps which can affect the execution of a protocol sensitive to their temporal validity. We prove that this temporal extension together with the increased power of the intruder model do not affect the complexity of the protocol insecurity problem, which remains NP-complete as in the untimed case.

Timed protocol insecurity problem is NP-complete / Benerecetti, Massimo; Peron, Adriano. - In: FUTURE GENERATION COMPUTER SYSTEMS. - ISSN 0167-739X. - 29:3(2013), pp. 843-862. [10.1016/j.future.2011.11.001]

Timed protocol insecurity problem is NP-complete

BENERECETTI, MASSIMO;PERON, ADRIANO
2013

Abstract

In this paper we study the protocol insecurity problem for time-dependent security protocols under the finite number of sessions' assumption, extending to the timed case, previous results obtained for the same problem in the untimed case. In particular, we propose a timed specification language, which allows to model temporal features typically involved in the implementation of security protocols. We introduce a stronger version of the Dolev-Yao intruder, by allowing it to generate new timestamps which can affect the execution of a protocol sensitive to their temporal validity. We prove that this temporal extension together with the increased power of the intruder model do not affect the complexity of the protocol insecurity problem, which remains NP-complete as in the untimed case.
2013
Timed protocol insecurity problem is NP-complete / Benerecetti, Massimo; Peron, Adriano. - In: FUTURE GENERATION COMPUTER SYSTEMS. - ISSN 0167-739X. - 29:3(2013), pp. 843-862. [10.1016/j.future.2011.11.001]
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/416919
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact