An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata
An experiment is described that confirms the security of a well-studied class of cryptographic protocols (Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata (2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language (the pr...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Publishing Association
2018-03-01
|
Series: | Electronic Proceedings in Theoretical Computer Science |
Online Access: | http://arxiv.org/pdf/1803.10327v1 |
id |
doaj-01ab64c4b73b40c684ff17a23e524b40 |
---|---|
record_format |
Article |
spelling |
doaj-01ab64c4b73b40c684ff17a23e524b402020-11-25T01:13:35ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802018-03-01268Proc. MARS/VPT 201816918410.4204/EPTCS.268.6:4An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown AutomataRobert Glück0 DIKU, Dept. of Computer Science, University of Copenhagen An experiment is described that confirms the security of a well-studied class of cryptographic protocols (Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata (2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language (the protocol to verify) and a given Dyck language containing all canceling words is empty. If it is not, an intruder can reveal secret messages sent between trusted users. The verification is guaranteed to terminate in cubic time at most on a 2NPDA-simulator. The interpretive approach used in this experiment simplifies the verification, by separating the nondeterministic pushdown logic and program control, and makes it more predictable. We describe the interpretive approach and the known transformational solutions, and show they share interesting features. Also noteworthy is how abstract results from automata theory can solve practical problems by programming language means.http://arxiv.org/pdf/1803.10327v1 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Robert Glück |
spellingShingle |
Robert Glück An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata Electronic Proceedings in Theoretical Computer Science |
author_facet |
Robert Glück |
author_sort |
Robert Glück |
title |
An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata |
title_short |
An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata |
title_full |
An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata |
title_fullStr |
An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata |
title_full_unstemmed |
An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata |
title_sort |
experiment in ping-pong protocol verification by nondeterministic pushdown automata |
publisher |
Open Publishing Association |
series |
Electronic Proceedings in Theoretical Computer Science |
issn |
2075-2180 |
publishDate |
2018-03-01 |
description |
An experiment is described that confirms the security of a well-studied class of cryptographic protocols (Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata (2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language (the protocol to verify) and a given Dyck language containing all canceling words is empty. If it is not, an intruder can reveal secret messages sent between trusted users. The verification is guaranteed to terminate in cubic time at most on a 2NPDA-simulator. The interpretive approach used in this experiment simplifies the verification, by separating the nondeterministic pushdown logic and program control, and makes it more predictable. We describe the interpretive approach and the known transformational solutions, and show they share interesting features. Also noteworthy is how abstract results from automata theory can solve practical problems by programming language means. |
url |
http://arxiv.org/pdf/1803.10327v1 |
work_keys_str_mv |
AT robertgluck anexperimentinpingpongprotocolverificationbynondeterministicpushdownautomata AT robertgluck experimentinpingpongprotocolverificationbynondeterministicpushdownautomata |
_version_ |
1725161398147743744 |