src/HOL/Auth/README.html
author paulson
Thu Sep 23 13:06:31 1999 +0200 (1999-09-23)
changeset 7584 5be4bb8e4e3f
parent 6452 6a1b393ccdc0
child 13508 890d736b93a5
permissions -rw-r--r--
tidied; added lemma restrict_to_left
paulson@3119
     1
<!-- $Id$ -->
paulson@3119
     2
<HTML><HEAD><TITLE>HOL/Auth/README</TITLE></HEAD><BODY>
paulson@3119
     3
paulson@3119
     4
<H2>Auth--The Inductive Approach to Verifying Security Protocols</H2>
paulson@3119
     5
paulson@3119
     6
<P>Cryptographic protocols are of major importance, especially with the
paulson@3119
     7
growing use of the Internet.  This directory demonstrates a <A
paulson@4594
     8
HREF="http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html">new
paulson@3119
     9
proof method</A>.  The operational semantics of protocol participants is
paulson@3119
    10
defined inductively.  The directory contains proofs concerning
paulson@3119
    11
paulson@3119
    12
<UL>
paulson@3119
    13
<LI>three versions of the Otway-Rees protocol
paulson@3119
    14
paulson@4594
    15
<LI>the Needham-Schroeder protocol (public-key and shared-key versions)
paulson@3119
    16
paulson@6452
    17
<LI>two versions of Kerberos: the simplified form published in the BAN paper
paulson@6452
    18
	and also the full protocol (Kerberos IV)
paulson@6400
    19
paulson@6400
    20
<LI>three versions of the Yahalom protocol, including a bad one that 
paulson@6400
    21
	illustrates the purpose of the Oops rule
paulson@3119
    22
paulson@4594
    23
<LI>a novel recursive authentication protocol 
paulson@4594
    24
paulson@4594
    25
<LI>the Internet protocol TLS
paulson@3119
    26
</UL>
paulson@3119
    27
paulson@3119
    28
<HR>
paulson@4594
    29
<P>Last modified 30 Jan 1998
paulson@3119
    30
paulson@3119
    31
<ADDRESS>
paulson@3119
    32
<A NAME="lcp@cl.cam.ac.uk" HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A>
paulson@3119
    33
</ADDRESS>
paulson@3119
    34
</BODY></HTML>