|
Program Semantics, Specification and Verification
Even simple processes of $\pi$-calculus are hard for analysis
M. M. Abbasa, V. A. Zakharovbc a Lomonosov Moscow State University,
GSP-1, Leninskie Gory, Moscow, 119991, Russia
b National Research University Higher School of Economics (HSE),
20 Myasnitskaya st., Moscow, 101000 Russia
c Institute for system programming of the Russian Academy of Science (ISP RAS),
25 Alexander Solzhenitsyn st., Moscow, 109004 Russia
Abstract:
Mathematical models of distributed computations, based on the calculus of mobile processes ($\pi$-calculus) are widely used for checking the information security properties of cryptographic protocols. Since $\pi$-calculus is Turing-complete, this problem is undecidable in general case. Therefore, the study is carried out only for some special classes of $\pi$-calculus processes with restricted computational capabilities, for example, for non-recursive processes, in which all runs have a bounded length, for processes with a bounded number of parallel components, etc. However, even in these cases, the proposed checking procedures are time consuming. We assume that this is due to the very nature of the $\pi$ -calculus processes. The goal of this paper is to show that even for the weakest model of passive adversary and for relatively simple protocols that use only the basic $\pi$-calculus operations, the task of checking the information security properties of these protocols is co-NP-complete.
Keywords:
$\pi$-calculus, protocol, security, passive adversary, verification, complexity, NP-completeness.
Received: 15.09.2018 Revised: 30.10.2018 Accepted: 10.11.2018
Citation:
M. M. Abbas, V. A. Zakharov, “Even simple processes of $\pi$-calculus are hard for analysis”, Model. Anal. Inform. Sist., 25:6 (2018), 589–606
Linking options:
https://www.mathnet.ru/eng/mais651 https://www.mathnet.ru/eng/mais/v25/i6/p589
|
|