RUS  ENG
Full version
JOURNALS // Modelirovanie i Analiz Informatsionnykh Sistem // Archive

Model. Anal. Inform. Sist., 2018 Volume 25, Number 6, Pages 589–606 (Mi mais651)

Program Semantics, Specification and Verification

Even simple processes of $\pi$-calculus are hard for analysis

M. M. Abbasa, V. A. Zakharovbc

a Lomonosov Moscow State University, GSP-1, Leninskie Gory, Moscow, 119991, Russia
b National Research University Higher School of Economics (HSE), 20 Myasnitskaya st., Moscow, 101000 Russia
c Institute for system programming of the Russian Academy of Science (ISP RAS), 25 Alexander Solzhenitsyn st., Moscow, 109004 Russia

Abstract: Mathematical models of distributed computations, based on the calculus of mobile processes ($\pi$-calculus) are widely used for checking the information security properties of cryptographic protocols. Since $\pi$-calculus is Turing-complete, this problem is undecidable in general case. Therefore, the study is carried out only for some special classes of $\pi$-calculus processes with restricted computational capabilities, for example, for non-recursive processes, in which all runs have a bounded length, for processes with a bounded number of parallel components, etc. However, even in these cases, the proposed checking procedures are time consuming. We assume that this is due to the very nature of the $\pi$ -calculus processes. The goal of this paper is to show that even for the weakest model of passive adversary and for relatively simple protocols that use only the basic $\pi$-calculus operations, the task of checking the information security properties of these protocols is co-NP-complete.

Keywords: $\pi$-calculus, protocol, security, passive adversary, verification, complexity, NP-completeness.

UDC: 517.9

Received: 15.09.2018
Revised: 30.10.2018
Accepted: 10.11.2018

DOI: 10.18255/1818-1015-589-606



© Steklov Math. Inst. of RAS, 2024