Abstract
Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back. This “ping-pong” action continues several times, using sequences of operators as specified by the protocol. The set of operators may include public-key encryptions and decryptions.
A theorem of Dolev and Yao is presented with a new proof.
An O(n 3) algorithm, of Dolev, Even and Karp, for testing the security of two user ping-pong protocols, is described. It is shown that their results are easily extendible from the security of secret messages to more general questions of security, such as security against forged signatures.
The results of Even and Goldreich concerning the security of multi-party protocols are briefly described.
Finally, comments are made concerning recently published attacks on RSA. It is argued that it makes no sense to criticize a cryptographic system without reference to the protocols that use it, and that in fact, the attacks suggested assume an insecure protocol. Also, a theorem is stated to the effect that if a protocol (or set of protocols) is secure on the abstract level, then the algebraic properties used in these attacks will never convert a secure system into an insecure one.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
DIFFIE, W. AND HELLMAN, M. E. (1976). New directions in cryptography. IEEE Trans. Inform. Theory IT-22 (6), 644–654.
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21 (2), 120–126.
NEEDHAM, R. M. AND SCHROEDER, M. D. (1978). Using encryption for authentication in large networks of computers. Comm. ACM 21 (12), 993–999.
DOLEV, D. AND YAO, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory IT-30 (2), 198–208.
DOLEV, D., EVEN, S. AND KARP, R. M. (1982). On the security of ping-pong protocols. Inform. and Contr. 55, 57–68.
EVEN, S. AND GOLDREICH, O. (1983). On the security of multi-party ping-pong protocols. 24th Annual Symp. of Found. of Comp. Sci., Nov. 1983. IEEE Computer Society, 34–39.
RABIN, M. O. (1979). Digital signatures and public key functions as intractable as factor-ization. MIT/LCS/TR-212.
DENNING, D. E. (1984). Digital signatures with RSA and other public-key cryptosystems. Comm. of the ACM 27, April 1984, 388–392.
ROSEN, R. K. (1973). Tree-manipulating systems and church-rosser theorems. J. Assoc. Comput. Mach. 20 (1), 160–187.
RUBINSTEIN, R. S. (1984). Signatures and ping-pong protocols. Dept. of Comp. Sci., Iowa State Univ.
WILLIAMS, H. C. (1980). A modification of the RSA public-key encryption procedure. IEEE Trans. Inform. Theory IT-26, 726–729.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Even, S. (1985). On the Complexity of Some Word Problems That Arise in Testing the Security of Protocols. In: Apostolico, A., Galil, Z. (eds) Combinatorial Algorithms on Words. NATO ASI Series, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-82456-2_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-82456-2_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-82458-6
Online ISBN: 978-3-642-82456-2
eBook Packages: Springer Book Archive