Jan. 29, 2024, 2:10 a.m. | R Ramanujam, Vaishnavi Sundararajan, S P Suresh

cs.CR updates on arXiv.org arxiv.org

In the symbolic verification of cryptographic protocols, a central problem is
deciding whether a protocol admits an execution which leaks a designated secret
to the malicious intruder. Rusinowitch & Turuani (2003) show that, when
considering finitely many sessions, this ``insecurity problem'' is NP-complete.
Central to their proof strategy is the observation that any execution of a
protocol can be simulated by one where the intruder only communicates terms of
bounded size. However, when we consider models where, in addition to …

amp arxiv cryptographic insecurity intruder leaks malicious problem proof protocol protocols secret sessions strategy verification

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Application Security Engineer - Enterprise Engineering

@ Meta | Bellevue, WA | Seattle, WA | New York City | Fremont, CA

Security Engineer

@ Retool | San Francisco, CA

Senior Product Security Analyst

@ Boeing | USA - Seattle, WA

Junior Governance, Risk and Compliance (GRC) and Operations Support Analyst

@ McKenzie Intelligence Services | United Kingdom - Remote

GRC Integrity Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City