An experiment in ping-pong protocol verification by nondeterministic pushdown automata

38 Downloads (Pure)

Abstract

An experiment is described that confirms the security of a well-studied class of cryptographic protocols(Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata(2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language(the protocol to verify) and a given Dyck language containing all canceling words is empty. Ifit is not, an intruder can reveal secret messages sent between trusted users. The verification is guaranteedto terminate in cubic time at most on a 2NPDA-simulator. The interpretive approach used in thisexperiment simplifies the verification, by separating the nondeterministic pushdown logic and programcontrol, and makes it more predictable. We describe the interpretive approach and the knowntransformational solutions, and show they share interesting features. Also noteworthy is how abstractresults from automata theory can solve practical problems by programming language means.
Original languageEnglish
Title of host publicationProceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation. Proceedings
EditorsJohn P. Gallagher, Rob van Glabbeek, Wendelin Serwe
PublisherOpen Publishing Association
Publication date23 Mar 2018
Pages169-184
DOIs
Publication statusPublished - 23 Mar 2018
Event6th International Workshop on Verification and Program Transformation - Thessaloniki, Greece
Duration: 20 Apr 2018 → …

Workshop

Workshop6th International Workshop on Verification and Program Transformation
Country/TerritoryGreece
CityThessaloniki
Period20/04/2018 → …
SeriesElectronic Proceedings in Theoretical Computer Science
Volume268
ISSN2075-2180

Fingerprint

Dive into the research topics of 'An experiment in ping-pong protocol verification by nondeterministic pushdown automata'. Together they form a unique fingerprint.

Cite this