Paper 2006/068
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes, Birgit Pfitzmann, and Michael Waidner
Abstract
Automated tools such as model checkers and theorem provers for the analysis of security protocols typically abstract from cryptography by Dolev-Yao models, i.e., abstract term algebras replace the real cryptographic operations. Recently it was shown that in essence this approach is cryptographically sound for certain operations like signing and encryption. The strongest results show this in the sense of blackbox reactive simulatability (BRSIM)/UC with only small changes to both Dolev-Yao models and natural implementations. This notion essentially means the preservation of arbitrary security properties under active attacks in arbitrary protocol environments. We show that it is impossible to extend the strong BRSIM/UC results to usual Dolev-Yao models of hash functions in the general case. These models treat hash functions as free operators of the term algebra. In contrast, we show that these models are sound in the same strict sense in the random oracle model of cryptography. For the standard model of cryptography, we also discuss several conceivable restrictions to the Dolev-Yao models and classify them into possible and impossible cases.
Note: PDF version added
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Dolev-Yao modelssymbolic hash functionssimulatabilityUCimpossibility
- Contact author(s)
- backes @ cs uni-sb de
- History
- 2007-05-01: revised
- 2006-02-23: received
- See all versions
- Short URL
- https://ia.cr/2006/068
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2006/068, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Limits of the Reactive Simulatability/{UC} of Dolev-Yao Models with Hashes}, howpublished = {Cryptology {ePrint} Archive, Paper 2006/068}, year = {2006}, url = {https://eprint.iacr.org/2006/068} }