It is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, a common assumption is that agents are perfectly rational and have no computational limitations. This creates a dilemma. If one merely abstracts from computational aspects, protocols become trivial and the difference between tractable and intractable computation, surely an essential feature of protocols, disappears. This way, the protocol gets lost. On the other hand, if one ‘merely′ (scare quotes indeed) models agents with computational limitations (or otherwise bounded rationality), very obvious aspects of reasoning become problematic. That way, the logic gets lost. We present a novel way out of this dilemma.We propose an abstract logical architecture wherein public and private, or symmetric keys, and their roles in cryptographic protocols, all have formal counterparts. Instead of having encryption and decryption done by a principal, the agent sending or receiving messages, we introduce additional, virtual, agents to model that, so that one-way-function aspects of computation can be modelled as constraints on the communication between principals and these virtual counterparts. In this modelling it does not affect essential protocol features if agents are computationally unlimited.We have implemented the proposal in a dynamic epistemic model checker called DEMO.

Additional Metadata
Keywords epistemic logic, cryptography
MSC Logics of knowledge and belief (including belief change) (msc 03B42)
THEME Software (theme 1), Logistics (theme 3)
Publisher Springer
Editor J.B. Perez , not CWI et al
Series Advances in Intelligent and Soft Computing
Project Knowledge and Interaction in Social and Economic Networks
Conference International Conference on Practical Applications of Agents and Multi-Agent Systems
Citation
van Ditmarsch, H, van Eijck, D.J.N, Sietsma, F.A.G, Simon, S.E, & CWI et al, not. (2012). Modelling Cryptographic Keys in Dynamic Epistemic Logic with DEMO. In J.B Perez & not CWI et al (Eds.), Highlights on Practical Applications of Agents and Multi-Agent Systems (pp. 155–162). Springer.