Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols

José Meseguer, Prasanna Thati

Research output: Contribution to journalArticlepeer-review

Abstract

Narrowing was introduced, and has traditionally been used, to solve equations in initial and free algebras modulo a set of equations E. This paper proposes a generalization of narrowing which can be used to solve reachability goals in initial and free models of a rewrite theory ℛ. We show that narrowing is sound and weakly complete (i.e., complete for normalized solutions) under appropriate executability assumptions about ℛ. We also show that in general narrowing is not strongly complete, that is, not complete when some solutions can be further rewritten by ℛ. We then identify several large classes of rewrite theories, covering many practical applications, for which narrowing is strongly complete. Finally, we illustrate an application of narrowing to analysis of cryptographic protocols.

Original languageEnglish (US)
Pages (from-to)123-160
Number of pages38
JournalHigher-Order and Symbolic Computation
Volume20
Issue number1-2
DOIs
StatePublished - Jun 2007

Keywords

  • Narrowing
  • Reachability
  • Rewrite theories
  • Security protocols

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols'. Together they form a unique fingerprint.

Cite this