𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Protocol insecurity with a finite number of sessions and composed keys is NP-complete

✍ Scribed by Michaël Rusinowitch; Mathieu Turuani


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
341 KB
Volume
299
Category
Article
ISSN
0304-3975

No coin nor oath required. For personal study only.

✦ Synopsis


We investigate the complexity of the protocol insecurity problem for a ÿnite number of sessions (ÿxed number of interleaved runs). We show that this problem is NP-complete with respect to a Dolev-Yao model of intruders. The result does not assume a limit on the size of messages and supports non-atomic symmetric encryption keys. We also prove that in order to build an attack with a ÿxed number of sessions the intruder needs only to forge messages of linear size, provided that they are represented as dags.