کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
417438 681513 2014 18 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Bounded memory protocols
ترجمه فارسی عنوان
پروتکل های حافظه محدود
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
چکیده انگلیسی


• A new class of security protocols is introduced called Bounded Memory Protocols
• The secrecy problem is undecidable even when we bound the memory of the honest agents.
• The Standard Dolev–Yao adversary cannot be approximated by Bounded Memory ones.

It is well-known that the Dolev–Yao adversary is a powerful adversary. Besides acting as the network, intercepting, decomposing, composing and sending messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev–Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev–Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where although the total number of sessions is unbounded, there are only a bounded number of concurrent sessions and the honest participants of the protocol cannot remember an unbounded number of facts or an unbounded number of nonces at a time. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev–Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively (Theorem 8).

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Languages, Systems & Structures - Volume 40, Issues 3–4, October–December 2014, Pages 137–154
نویسندگان
, , , ,