Cryptology ePrint Archive: Report 2006/068
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes and Birgit Pfitzmann and Michael Waidner
Abstract: Automated tools such as model checkers and theorem provers for the
analysis of security protocols typically abstract from cryptography by
Dolev-Yao models, i.e., abstract term algebras replace the real
cryptographic operations. Recently it was shown that in essence this
approach is cryptographically sound for certain operations like
signing and encryption. The strongest results show this in the sense
of blackbox reactive simulatability (BRSIM)/UC with only small changes
to both Dolev-Yao models and natural implementations. This notion
essentially means the preservation of arbitrary security properties
under active attacks in arbitrary protocol environments.
We show that it is impossible to extend the strong BRSIM/UC results to
usual Dolev-Yao models of hash functions in the general case. These
models treat hash functions as free operators of the term algebra. In
contrast, we show that these models are sound in the same strict sense
in the random oracle model of cryptography. For the standard model of
cryptography, we also discuss several conceivable restrictions to the
Dolev-Yao models and classify them into possible and impossible cases.
Category / Keywords: foundations / Dolev-Yao models, symbolic hash functions, simulatability, UC, impossibility
Date: received 21 Feb 2006, last revised 1 May 2007
Contact author: backes at cs uni-sb de
Available formats: PDF | BibTeX Citation
Note: PDF version added
Version: 20070501:170949 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]