Skip to main content

On the Complexity of Some Word Problems That Arise in Testing the Security of Protocols

  • Conference paper
Combinatorial Algorithms on Words

Part of the book series: NATO ASI Series ((NATO ASI F,volume 12))

Abstract

Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back. This “ping-pong” action continues several times, using sequences of operators as specified by the protocol. The set of operators may include public-key encryptions and decryptions.

A theorem of Dolev and Yao is presented with a new proof.

An O(n 3) algorithm, of Dolev, Even and Karp, for testing the security of two user ping-pong protocols, is described. It is shown that their results are easily extendible from the security of secret messages to more general questions of security, such as security against forged signatures.

The results of Even and Goldreich concerning the security of multi-party protocols are briefly described.

Finally, comments are made concerning recently published attacks on RSA. It is argued that it makes no sense to criticize a cryptographic system without reference to the protocols that use it, and that in fact, the attacks suggested assume an insecure protocol. Also, a theorem is stated to the effect that if a protocol (or set of protocols) is secure on the abstract level, then the algebraic properties used in these attacks will never convert a secure system into an insecure one.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • DIFFIE, W. AND HELLMAN, M. E. (1976). New directions in cryptography. IEEE Trans. Inform. Theory IT-22 (6), 644–654.

    Google Scholar 

  • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21 (2), 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  • NEEDHAM, R. M. AND SCHROEDER, M. D. (1978). Using encryption for authentication in large networks of computers. Comm. ACM 21 (12), 993–999.

    MATH  Google Scholar 

  • DOLEV, D. AND YAO, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory IT-30 (2), 198–208.

    Google Scholar 

  • DOLEV, D., EVEN, S. AND KARP, R. M. (1982). On the security of ping-pong protocols. Inform. and Contr. 55, 57–68.

    MathSciNet  MATH  Google Scholar 

  • EVEN, S. AND GOLDREICH, O. (1983). On the security of multi-party ping-pong protocols. 24th Annual Symp. of Found. of Comp. Sci., Nov. 1983. IEEE Computer Society, 34–39.

    Google Scholar 

  • RABIN, M. O. (1979). Digital signatures and public key functions as intractable as factor-ization. MIT/LCS/TR-212.

    Google Scholar 

  • DENNING, D. E. (1984). Digital signatures with RSA and other public-key cryptosystems. Comm. of the ACM 27, April 1984, 388–392.

    Article  MathSciNet  Google Scholar 

  • ROSEN, R. K. (1973). Tree-manipulating systems and church-rosser theorems. J. Assoc. Comput. Mach. 20 (1), 160–187.

    Article  MathSciNet  MATH  Google Scholar 

  • RUBINSTEIN, R. S. (1984). Signatures and ping-pong protocols. Dept. of Comp. Sci., Iowa State Univ.

    Google Scholar 

  • WILLIAMS, H. C. (1980). A modification of the RSA public-key encryption procedure. IEEE Trans. Inform. Theory IT-26, 726–729.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1985 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Even, S. (1985). On the Complexity of Some Word Problems That Arise in Testing the Security of Protocols. In: Apostolico, A., Galil, Z. (eds) Combinatorial Algorithms on Words. NATO ASI Series, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-82456-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-82456-2_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-82458-6

  • Online ISBN: 978-3-642-82456-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics