Protocol insecurity with finitely many sessions and XOR
Published: Jun 30, 2025
Last Updated: Jun 30, 2025
Authors:R Ramanujam, Vaishnavi Sundararajan, S P Suresh
Abstract
We present a different proof of the insecurity problem for XOR, solved in by Chevalier, Kuesters, Rusinowitch and Turuani (2005). Our proof uses the notion of typed terms and well-typed proofs, and removes a restriction on the class of protocols to which the [CKRT05] proof applies, by introducing a slightly different (but very natural) notion of protocols, where honest agent sends are derivable from previous receives in the same session.