Skip to main content

A Unification Algorithm for Analysis of Protocols with Blinded Signatures

  • Chapter
Mechanizing Mathematical Reasoning

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2605))

Abstract

Analysis of authentication cryptographic protocols, particularly finding flaws in them and determining a sequence of actions that an intruder can take to gain access to the information which a given protocol purports not to reveal, has recently received considerable attention. One effective way of detecting flaws is to hypothesize an insecure state and determine whether it is possible to get to that state by a legal sequence of actions permitted by the protocol from some legal initial state which captures the knowledge of the principals and the assumptions made about an intruder’s behavior. Relations among encryption and decryption functions as well as properties of number theoretic functions used in encryption and decryption can be specified as rewrite rules. This, for example, is the approach used by the NRL Protocol Analyzer, which uses narrowing to reason about such properties of cryptographic and number-theoretic functions.

Following [15], a related approach is proposed here in which equation solving modulo most of these properties of cryptographic and number-theoretic functions is done by developing new unification algorithms for such theories. A new unification algorithm for an equational theory needed to reason about protocols that use the Diffie-Hellman algorithm is developed. In this theory, multiplication forms an abelian group; exponentiation function distributes over multiplication, and exponents can commute. This theory is useful for analyzing protocols which use blinded signatures. It is proved that the unification problem over this equational theory can be reduced to the unification problem modulo the theory of abelian groups with commuting homomorphisms with an additional constraint. Baader’s unification algorithm for the theory of abelian groups with commuting homomorphisms, which reduces the unification problem to solving equations over the polynomial ring over the integers with the commuting homomorphisms serving as indeterminates, is generalized to give a unification algorithm over the theory of abelian groups with commuting homomorphism with a linear constraint.

It is also shown that the unification problem over a (simple) extension of the equational theory considered here (which is also an extension of the equational theory considered in [15]) is undecidable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baader, F., Schultz, K.U.: Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures. In: Kapur, D. (ed.) CADE 1992. LNCS (LNAI), vol. 607, pp. 50–65. Springer, Heidelberg (1992)

    Google Scholar 

  2. Baader, F.: Unification in Commutative Theories, Hilbert’s Basis Theorem, and Gröbner Bases. J. ACM 40(3), 477–503 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  3. Baader, F., Nutt, W.: Adding Homomorphisms to Commutative/Monoidal Theories, or: How Algebra Can Help in Equational Unification. In: Book, R.V. (ed.) RTA 1991. LNCS, vol. 488, pp. 124–135. Springer, Heidelberg (1991)

    Google Scholar 

  4. Baader, F., Snyder, W.: Unification Theory. In: Robinson, J.A., Voronkov, A. (eds.) Handbook of Automated Reasoning. Elsevier Science Publishers, Amsterdam (2001)

    Google Scholar 

  5. Buchberger, B.: Gröbner Bases: An Algorithmic Method in Polynomial Ideal Theory. In: Bose, N.K. (ed.) Multidimensional Systems Theory, Reichel, Dordrecht, pp. 184–229 (1985)

    Google Scholar 

  6. Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. CACM 28(10), 1030–1044 (1985)

    Google Scholar 

  7. Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0. Unpublished Technical Report, Department of Computer Science, University of York, UK (November 1997), Available at the http://www-users.cs.york.ac.uk/~jac/papers/drareviewps.ps

  8. Davis, M.: Computability and Unsolvability. Dover Publications, Mineola (1982)

    MATH  Google Scholar 

  9. Hullot, J.-M.: Canonical forms and unification. In: Bibel, W. (ed.) CADE 1980. LNCS, vol. 87, pp. 318–334. Springer, Heidelberg (1980)

    Google Scholar 

  10. Kandri-Rody, A., Kapur, D.: Computing the Gröbner Basis of a Polynomial Ideal over Integers. In: Proc. Third MACSYMA Users’ Conference, Schenectady, NY, pp. 436–451 (July 1984)

    Google Scholar 

  11. Kapur, D., Narendran, P., Wang, L.: A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Technical Report, Department of Computer Science, University at Albany–SUNY, Albany, NY. Also: Technical Report, Department of Computer Science, University of New Mexico, Albuquerque, NM (July 2002)

    Google Scholar 

  12. Kapur, D., Sivakumar, G.: A Total, Ground Path Ordering for Proving Termination of AC-Rewrite Systems. In: Comon, H. (ed.) RTA 1997. LNCS, vol. 1232, pp. 142–156. Springer, Heidelberg (1997)

    Google Scholar 

  13. Meadows, C.: Formal Verification of Cryptographic Protcols: A Survey. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163. Springer, Heidelberg (1996)

    Google Scholar 

  14. Meadows, C.: The NRL Protocol Analyzer: An Overview. J. Logic Programming 26(2), 113–131 (1996)

    Article  MATH  Google Scholar 

  15. Meadows, C., Narendran, P.: A Unification Algorithm for the Group Diffie- Hellman Protocol. Presented at the Workshop on Issues in the Theory of Security (WITS 2002), Portland, Oregon (January 2002)

    Google Scholar 

  16. Narendran, P., Pfenning, F., Statman, R.: On the Unification Problem for Cartesian Closed Categories. Journal of Symbolic Logic 62(2), 636–647 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  17. Nutt, W.: Unification in Monoidal Theories. In: Stickel, M.E. (ed.) CADE 1990. LNCS, vol. 449. Springer, Heidelberg (1990)

    Google Scholar 

  18. Pereira, O., Quisquater, J.-J.: A Security Analysis of the Cliques Protocols Suites. In: Proc. 14th IEEE Computer Security Foundations Workshop, pp. 73–81 (June 2001)

    Google Scholar 

  19. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. CACM 21(2), 120–126 (1978)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kapur, D., Narendran, P., Wang, L. (2005). A Unification Algorithm for Analysis of Protocols with Blinded Signatures. In: Hutter, D., Stephan, W. (eds) Mechanizing Mathematical Reasoning. Lecture Notes in Computer Science(), vol 2605. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32254-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-32254-2_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25051-7

  • Online ISBN: 978-3-540-32254-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics