src/HOL/Auth/Message.ML
author paulson
Tue, 16 Dec 1997 15:17:26 +0100
changeset 4422 21238c9d363e
parent 4157 200f897f0858
child 4477 b3e5857d8d99
permissions -rw-r--r--
Simplified proofs using rewrites for f``A where f is injective
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     1
(*  Title:      HOL/Auth/Message
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     2
    ID:         $Id$
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     3
    Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     4
    Copyright   1996  University of Cambridge
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     5
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     6
Datatypes of agents and messages;
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
     7
Inductive relations "parts", "analz" and "synth"
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     8
*)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
     9
3702
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    10
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    11
(*Eliminates a commonly-occurring expression*)
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    12
goal HOL.thy "~ (ALL x. x~=y)";
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    13
by (Blast_tac 1);
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    14
Addsimps [result()];
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
    15
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    16
open Message;
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    17
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    18
AddIffs atomic.inject;
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    19
AddIffs msg.inject;
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    20
4422
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    21
(*Equations hold because constructors are injective; cannot prove for all f*)
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
    22
goal thy "(Friend x : Friend``A) = (x:A)";
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
    23
by (Auto_tac());
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
    24
qed "Friend_image_eq";
4422
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    25
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    26
goal thy "(Key x : Key``A) = (x:A)";
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    27
by (Auto_tac());
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    28
qed "Key_image_eq";
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    29
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    30
goal thy "(Nonce x ~: Key``A)";
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    31
by (Auto_tac());
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    32
qed "Nonce_Key_image_eq";
21238c9d363e Simplified proofs using rewrites for f``A where f is injective
paulson
parents: 4157
diff changeset
    33
Addsimps [Friend_image_eq, Key_image_eq, Nonce_Key_image_eq];
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
    34
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
    35
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    36
(** Inverse of keys **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    37
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    38
goal thy "!!K K'. (invKey K = invKey K') = (K=K')";
3730
6933d20f335f Step_tac -> Safe_tac
paulson
parents: 3714
diff changeset
    39
by Safe_tac;
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
    40
by (rtac box_equals 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    41
by (REPEAT (rtac invKey 2));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    42
by (Asm_simp_tac 1);
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    43
qed "invKey_eq";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    44
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    45
Addsimps [invKey, invKey_eq];
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    46
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    47
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    48
(**** keysFor operator ****)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    49
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    50
goalw thy [keysFor_def] "keysFor {} = {}";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
    51
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    52
qed "keysFor_empty";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    53
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    54
goalw thy [keysFor_def] "keysFor (H Un H') = keysFor H Un keysFor H'";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
    55
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    56
qed "keysFor_Un";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    57
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
    58
goalw thy [keysFor_def] "keysFor (UN i:A. H i) = (UN i:A. keysFor (H i))";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
    59
by (Blast_tac 1);
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
    60
qed "keysFor_UN";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    61
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    62
(*Monotonicity*)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    63
goalw thy [keysFor_def] "!!G H. G<=H ==> keysFor(G) <= keysFor(H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
    64
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    65
qed "keysFor_mono";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    66
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    67
goalw thy [keysFor_def] "keysFor (insert (Agent A) H) = keysFor H";
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
    68
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    69
qed "keysFor_insert_Agent";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    70
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    71
goalw thy [keysFor_def] "keysFor (insert (Nonce N) H) = keysFor H";
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
    72
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    73
qed "keysFor_insert_Nonce";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    74
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    75
goalw thy [keysFor_def] "keysFor (insert (Number N) H) = keysFor H";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    76
by (Blast_tac 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    77
qed "keysFor_insert_Number";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    78
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    79
goalw thy [keysFor_def] "keysFor (insert (Key K) H) = keysFor H";
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
    80
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    81
qed "keysFor_insert_Key";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    82
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
    83
goalw thy [keysFor_def] "keysFor (insert (Hash X) H) = keysFor H";
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
    84
by (Blast_tac 1);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
    85
qed "keysFor_insert_Hash";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
    86
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    87
goalw thy [keysFor_def] "keysFor (insert {|X,Y|} H) = keysFor H";
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
    88
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    89
qed "keysFor_insert_MPair";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    90
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    91
goalw thy [keysFor_def]
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
    92
    "keysFor (insert (Crypt K X) H) = insert (invKey K) (keysFor H)";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    93
by (Auto_tac());
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    94
qed "keysFor_insert_Crypt";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
    95
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
    96
Addsimps [keysFor_empty, keysFor_Un, keysFor_UN, 
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    97
          keysFor_insert_Agent, keysFor_insert_Nonce, 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
    98
	  keysFor_insert_Number, keysFor_insert_Key, 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
    99
          keysFor_insert_Hash, keysFor_insert_MPair, keysFor_insert_Crypt];
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   100
AddSEs [keysFor_Un RS equalityD1 RS subsetD RS UnE,
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   101
	keysFor_UN RS equalityD1 RS subsetD RS UN_E];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   102
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   103
goalw thy [keysFor_def] "keysFor (Key``E) = {}";
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   104
by (Auto_tac ());
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   105
qed "keysFor_image_Key";
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   106
Addsimps [keysFor_image_Key];
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   107
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   108
goalw thy [keysFor_def] "!!H. Crypt K X : H ==> invKey K : keysFor H";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   109
by (Blast_tac 1);
2068
0d05468dc80c New theorem Crypt_imp_invKey_keysFor
paulson
parents: 2061
diff changeset
   110
qed "Crypt_imp_invKey_keysFor";
0d05468dc80c New theorem Crypt_imp_invKey_keysFor
paulson
parents: 2061
diff changeset
   111
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   112
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   113
(**** Inductive relation "parts" ****)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   114
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   115
val major::prems = 
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   116
goal thy "[| {|X,Y|} : parts H;       \
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   117
\            [| X : parts H; Y : parts H |] ==> P  \
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   118
\         |] ==> P";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   119
by (cut_facts_tac [major] 1);
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   120
by (resolve_tac prems 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   121
by (REPEAT (eresolve_tac [asm_rl, parts.Fst, parts.Snd] 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   122
qed "MPair_parts";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   123
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   124
AddIs  [parts.Inj];
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   125
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   126
val partsEs = [MPair_parts, make_elim parts.Body];
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   127
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   128
AddSEs partsEs;
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   129
(*NB These two rules are UNSAFE in the formal sense, as they discard the
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   130
     compound message.  They work well on THIS FILE, perhaps because its
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   131
     proofs concern only atomic messages.*)
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   132
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   133
goal thy "H <= parts(H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   134
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   135
qed "parts_increasing";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   136
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   137
(*Monotonicity*)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   138
goalw thy parts.defs "!!G H. G<=H ==> parts(G) <= parts(H)";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   139
by (rtac lfp_mono 1);
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   140
by (REPEAT (ares_tac basic_monos 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   141
qed "parts_mono";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   142
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   143
val parts_insertI = impOfSubs (subset_insertI RS parts_mono);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   144
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   145
goal thy "parts{} = {}";
3730
6933d20f335f Step_tac -> Safe_tac
paulson
parents: 3714
diff changeset
   146
by Safe_tac;
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   147
by (etac parts.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   148
by (ALLGOALS Blast_tac);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   149
qed "parts_empty";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   150
Addsimps [parts_empty];
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   151
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   152
goal thy "!!X. X: parts{} ==> P";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   153
by (Asm_full_simp_tac 1);
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   154
qed "parts_emptyE";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   155
AddSEs [parts_emptyE];
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   156
1893
fa58f4a06f21 Works up to main theorem, then XXX...X
paulson
parents: 1885
diff changeset
   157
(*WARNING: loops if H = {Y}, therefore must not be repeated!*)
fa58f4a06f21 Works up to main theorem, then XXX...X
paulson
parents: 1885
diff changeset
   158
goal thy "!!H. X: parts H ==> EX Y:H. X: parts {Y}";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   159
by (etac parts.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   160
by (ALLGOALS Blast_tac);
1893
fa58f4a06f21 Works up to main theorem, then XXX...X
paulson
parents: 1885
diff changeset
   161
qed "parts_singleton";
fa58f4a06f21 Works up to main theorem, then XXX...X
paulson
parents: 1885
diff changeset
   162
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   163
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   164
(** Unions **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   165
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   166
goal thy "parts(G) Un parts(H) <= parts(G Un H)";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   167
by (REPEAT (ares_tac [Un_least, parts_mono, Un_upper1, Un_upper2] 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   168
val parts_Un_subset1 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   169
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   170
goal thy "parts(G Un H) <= parts(G) Un parts(H)";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   171
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   172
by (etac parts.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   173
by (ALLGOALS Blast_tac);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   174
val parts_Un_subset2 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   175
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   176
goal thy "parts(G Un H) = parts(G) Un parts(H)";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   177
by (REPEAT (ares_tac [equalityI, parts_Un_subset1, parts_Un_subset2] 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   178
qed "parts_Un";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   179
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   180
goal thy "parts (insert X H) = parts {X} Un parts H";
1852
289ce6cb5c84 Added Msg 3; works up to Says_Server_imp_Key_newK
paulson
parents: 1839
diff changeset
   181
by (stac (read_instantiate [("A","H")] insert_is_Un) 1);
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   182
by (simp_tac (HOL_ss addsimps [parts_Un]) 1);
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   183
qed "parts_insert";
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   184
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   185
(*TWO inserts to avoid looping.  This rewrite is better than nothing.
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   186
  Not suitable for Addsimps: its behaviour can be strange.*)
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   187
goal thy "parts (insert X (insert Y H)) = parts {X} Un parts {Y} Un parts H";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   188
by (simp_tac (simpset() addsimps [Un_assoc]) 1);
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   189
by (simp_tac (simpset() addsimps [parts_insert RS sym]) 1);
1852
289ce6cb5c84 Added Msg 3; works up to Says_Server_imp_Key_newK
paulson
parents: 1839
diff changeset
   190
qed "parts_insert2";
289ce6cb5c84 Added Msg 3; works up to Says_Server_imp_Key_newK
paulson
parents: 1839
diff changeset
   191
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   192
goal thy "(UN x:A. parts(H x)) <= parts(UN x:A. H x)";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   193
by (REPEAT (ares_tac [UN_least, parts_mono, UN_upper] 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   194
val parts_UN_subset1 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   195
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   196
goal thy "parts(UN x:A. H x) <= (UN x:A. parts(H x))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   197
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   198
by (etac parts.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   199
by (ALLGOALS Blast_tac);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   200
val parts_UN_subset2 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   201
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   202
goal thy "parts(UN x:A. H x) = (UN x:A. parts(H x))";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   203
by (REPEAT (ares_tac [equalityI, parts_UN_subset1, parts_UN_subset2] 1));
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   204
qed "parts_UN";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   205
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   206
(*Added to simplify arguments to parts, analz and synth.
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   207
  NOTE: the UN versions are no longer used!*)
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   208
Addsimps [parts_Un, parts_UN];
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   209
AddSEs [parts_Un RS equalityD1 RS subsetD RS UnE,
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   210
	parts_UN RS equalityD1 RS subsetD RS UN_E];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   211
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   212
goal thy "insert X (parts H) <= parts(insert X H)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   213
by (blast_tac (claset() addIs [impOfSubs parts_mono]) 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   214
qed "parts_insert_subset";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   215
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   216
(** Idempotence and transitivity **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   217
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   218
goal thy "!!H. X: parts (parts H) ==> X: parts H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   219
by (etac parts.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   220
by (ALLGOALS Blast_tac);
2922
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   221
qed "parts_partsD";
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   222
AddSDs [parts_partsD];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   223
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   224
goal thy "parts (parts H) = parts H";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   225
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   226
qed "parts_idem";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   227
Addsimps [parts_idem];
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   228
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   229
goal thy "!!H. [| X: parts G;  G <= parts H |] ==> X: parts H";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   230
by (dtac parts_mono 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   231
by (Blast_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   232
qed "parts_trans";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   233
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   234
(*Cut*)
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   235
goal thy "!!H. [| Y: parts (insert X G);  X: parts H |] \
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   236
\              ==> Y: parts (G Un H)";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   237
by (etac parts_trans 1);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   238
by (Auto_tac());
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   239
qed "parts_cut";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   240
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   241
goal thy "!!H. X: parts H ==> parts (insert X H) = parts H";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   242
by (fast_tac (claset() addSDs [parts_cut]
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   243
                      addIs  [parts_insertI] 
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   244
                      addss (simpset())) 1);
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   245
qed "parts_cut_eq";
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   246
2028
738bb98d65ec Last working version prior to addition of "lost" component
paulson
parents: 2026
diff changeset
   247
Addsimps [parts_cut_eq];
738bb98d65ec Last working version prior to addition of "lost" component
paulson
parents: 2026
diff changeset
   248
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   249
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   250
(** Rewrite rules for pulling out atomic messages **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   251
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   252
fun parts_tac i =
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   253
  EVERY [rtac ([subsetI, parts_insert_subset] MRS equalityI) i,
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   254
         etac parts.induct i,
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
   255
         REPEAT (Blast_tac i)];
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   256
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   257
goal thy "parts (insert (Agent agt) H) = insert (Agent agt) (parts H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   258
by (parts_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   259
qed "parts_insert_Agent";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   260
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   261
goal thy "parts (insert (Nonce N) H) = insert (Nonce N) (parts H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   262
by (parts_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   263
qed "parts_insert_Nonce";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   264
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   265
goal thy "parts (insert (Number N) H) = insert (Number N) (parts H)";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   266
by (parts_tac 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   267
qed "parts_insert_Number";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   268
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   269
goal thy "parts (insert (Key K) H) = insert (Key K) (parts H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   270
by (parts_tac 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   271
qed "parts_insert_Key";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   272
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   273
goal thy "parts (insert (Hash X) H) = insert (Hash X) (parts H)";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   274
by (parts_tac 1);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   275
qed "parts_insert_Hash";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   276
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   277
goal thy "parts (insert (Crypt K X) H) = \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   278
\         insert (Crypt K X) (parts (insert X H))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   279
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   280
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   281
by (etac parts.induct 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   282
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   283
by (etac parts.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   284
by (ALLGOALS (blast_tac (claset() addIs [parts.Body])));
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   285
qed "parts_insert_Crypt";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   286
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   287
goal thy "parts (insert {|X,Y|} H) = \
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   288
\         insert {|X,Y|} (parts (insert X (insert Y H)))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   289
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   290
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   291
by (etac parts.induct 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   292
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   293
by (etac parts.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   294
by (ALLGOALS (blast_tac (claset() addIs [parts.Fst, parts.Snd])));
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   295
qed "parts_insert_MPair";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   296
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   297
Addsimps [parts_insert_Agent, parts_insert_Nonce, 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   298
	  parts_insert_Number, parts_insert_Key, 
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   299
          parts_insert_Hash, parts_insert_Crypt, parts_insert_MPair];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   300
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   301
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   302
goal thy "parts (Key``N) = Key``N";
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   303
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   304
by (etac parts.induct 1);
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   305
by (Auto_tac());
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   306
qed "parts_image_Key";
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   307
Addsimps [parts_image_Key];
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   308
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   309
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   310
(*In any message, there is an upper bound N on its greatest nonce.*)
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   311
goal thy "EX N. ALL n. N<=n --> Nonce n ~: parts {msg}";
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   312
by (induct_tac "msg" 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   313
by (induct_tac "atomic" 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   314
by (ALLGOALS (asm_simp_tac (simpset() addsimps [exI, parts_insert2])));
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   315
(*MPair case: blast_tac works out the necessary sum itself!*)
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   316
by (blast_tac (claset() addSEs [add_leE]) 2);
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   317
(*Nonce case*)
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   318
by (res_inst_tac [("x","N + Suc nat")] exI 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   319
by (fast_tac (claset() addSEs [add_leE] addaltern trans_tac) 1);
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   320
qed "msg_Nonce_supply";
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   321
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   322
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   323
(**** Inductive relation "analz" ****)
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   324
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   325
val major::prems = 
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   326
goal thy "[| {|X,Y|} : analz H;       \
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   327
\            [| X : analz H; Y : analz H |] ==> P  \
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   328
\         |] ==> P";
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   329
by (cut_facts_tac [major] 1);
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   330
by (resolve_tac prems 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   331
by (REPEAT (eresolve_tac [asm_rl, analz.Fst, analz.Snd] 1));
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   332
qed "MPair_analz";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   333
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   334
AddIs  [analz.Inj];
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   335
AddSEs [MPair_analz];      (*Perhaps it should NOT be deemed safe!*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   336
AddDs  [analz.Decrypt];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   337
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   338
Addsimps [analz.Inj];
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   339
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   340
goal thy "H <= analz(H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   341
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   342
qed "analz_increasing";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   343
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   344
goal thy "analz H <= parts H";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   345
by (rtac subsetI 1);
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   346
by (etac analz.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   347
by (ALLGOALS Blast_tac);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   348
qed "analz_subset_parts";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   349
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   350
bind_thm ("not_parts_not_analz", analz_subset_parts RS contra_subsetD);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   351
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   352
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   353
goal thy "parts (analz H) = parts H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   354
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   355
by (rtac (analz_subset_parts RS parts_mono RS subset_trans) 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   356
by (Simp_tac 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   357
by (blast_tac (claset() addIs [analz_increasing RS parts_mono RS subsetD]) 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   358
qed "parts_analz";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   359
Addsimps [parts_analz];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   360
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   361
goal thy "analz (parts H) = parts H";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   362
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   363
by (etac analz.induct 1);
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   364
by (Auto_tac());
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   365
qed "analz_parts";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   366
Addsimps [analz_parts];
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   367
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   368
(*Monotonicity; Lemma 1 of Lowe*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   369
goalw thy analz.defs "!!G H. G<=H ==> analz(G) <= analz(H)";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   370
by (rtac lfp_mono 1);
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   371
by (REPEAT (ares_tac basic_monos 1));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   372
qed "analz_mono";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   373
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   374
val analz_insertI = impOfSubs (subset_insertI RS analz_mono);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   375
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   376
(** General equational properties **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   377
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   378
goal thy "analz{} = {}";
3730
6933d20f335f Step_tac -> Safe_tac
paulson
parents: 3714
diff changeset
   379
by Safe_tac;
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   380
by (etac analz.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   381
by (ALLGOALS Blast_tac);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   382
qed "analz_empty";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   383
Addsimps [analz_empty];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   384
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   385
(*Converse fails: we can analz more from the union than from the 
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   386
  separate parts, as a key in one might decrypt a message in the other*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   387
goal thy "analz(G) Un analz(H) <= analz(G Un H)";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   388
by (REPEAT (ares_tac [Un_least, analz_mono, Un_upper1, Un_upper2] 1));
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   389
qed "analz_Un";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   390
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   391
goal thy "insert X (analz H) <= analz(insert X H)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   392
by (blast_tac (claset() addIs [impOfSubs analz_mono]) 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   393
qed "analz_insert";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   394
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   395
(** Rewrite rules for pulling out atomic messages **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   396
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   397
fun analz_tac i =
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   398
  EVERY [rtac ([subsetI, analz_insert] MRS equalityI) i,
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   399
         etac analz.induct i,
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
   400
         REPEAT (Blast_tac i)];
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   401
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   402
goal thy "analz (insert (Agent agt) H) = insert (Agent agt) (analz H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   403
by (analz_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   404
qed "analz_insert_Agent";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   405
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   406
goal thy "analz (insert (Nonce N) H) = insert (Nonce N) (analz H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   407
by (analz_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   408
qed "analz_insert_Nonce";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   409
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   410
goal thy "analz (insert (Number N) H) = insert (Number N) (analz H)";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   411
by (analz_tac 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   412
qed "analz_insert_Number";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   413
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   414
goal thy "analz (insert (Hash X) H) = insert (Hash X) (analz H)";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   415
by (analz_tac 1);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   416
qed "analz_insert_Hash";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   417
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   418
(*Can only pull out Keys if they are not needed to decrypt the rest*)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   419
goalw thy [keysFor_def]
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   420
    "!!K. K ~: keysFor (analz H) ==>  \
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   421
\         analz (insert (Key K) H) = insert (Key K) (analz H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   422
by (analz_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   423
qed "analz_insert_Key";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   424
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   425
goal thy "analz (insert {|X,Y|} H) = \
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   426
\         insert {|X,Y|} (analz (insert X (insert Y H)))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   427
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   428
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   429
by (etac analz.induct 1);
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   430
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   431
by (etac analz.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   432
by (ALLGOALS (blast_tac (claset() addIs [analz.Fst, analz.Snd])));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   433
qed "analz_insert_MPair";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   434
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   435
(*Can pull out enCrypted message if the Key is not known*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   436
goal thy "!!H. Key (invKey K) ~: analz H ==>  \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   437
\              analz (insert (Crypt K X) H) = \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   438
\              insert (Crypt K X) (analz H)";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   439
by (analz_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   440
qed "analz_insert_Crypt";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   441
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   442
goal thy "!!H. Key (invKey K) : analz H ==>  \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   443
\              analz (insert (Crypt K X) H) <= \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   444
\              insert (Crypt K X) (analz (insert X H))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   445
by (rtac subsetI 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   446
by (eres_inst_tac [("za","x")] analz.induct 1);
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
   447
by (ALLGOALS (Blast_tac));
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   448
val lemma1 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   449
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   450
goal thy "!!H. Key (invKey K) : analz H ==>  \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   451
\              insert (Crypt K X) (analz (insert X H)) <= \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   452
\              analz (insert (Crypt K X) H)";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   453
by (Auto_tac());
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   454
by (eres_inst_tac [("za","x")] analz.induct 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   455
by (Auto_tac());
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   456
by (blast_tac (claset() addIs [analz_insertI, analz.Decrypt]) 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   457
val lemma2 = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   458
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   459
goal thy "!!H. Key (invKey K) : analz H ==>  \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   460
\              analz (insert (Crypt K X) H) = \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   461
\              insert (Crypt K X) (analz (insert X H))";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   462
by (REPEAT (ares_tac [equalityI, lemma1, lemma2] 1));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   463
qed "analz_insert_Decrypt";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   464
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   465
(*Case analysis: either the message is secure, or it is not!
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   466
  Effective, but can cause subgoals to blow up!
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   467
  Use with expand_if;  apparently split_tac does not cope with patterns
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   468
  such as "analz (insert (Crypt K X) H)" *)
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   469
goal thy "analz (insert (Crypt K X) H) =                \
2154
913b4fc7670a New, purely illustrative result Crypt_synth_analz
paulson
parents: 2102
diff changeset
   470
\         (if (Key (invKey K) : analz H)                \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   471
\          then insert (Crypt K X) (analz (insert X H)) \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   472
\          else insert (Crypt K X) (analz H))";
2102
41a667d2c3fa Replaced excluded_middle_tac by case_tac
paulson
parents: 2068
diff changeset
   473
by (case_tac "Key (invKey K)  : analz H " 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   474
by (ALLGOALS (asm_simp_tac (simpset() addsimps [analz_insert_Crypt, 
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   475
                                               analz_insert_Decrypt])));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   476
qed "analz_Crypt_if";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   477
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   478
Addsimps [analz_insert_Agent, analz_insert_Nonce, 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   479
	  analz_insert_Number, analz_insert_Key, 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   480
          analz_insert_Hash, analz_insert_MPair, analz_Crypt_if];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   481
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   482
(*This rule supposes "for the sake of argument" that we have the key.*)
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   483
goal thy  "analz (insert (Crypt K X) H) <=  \
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   484
\          insert (Crypt K X) (analz (insert X H))";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   485
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   486
by (etac analz.induct 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   487
by (Auto_tac());
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   488
qed "analz_insert_Crypt_subset";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   489
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   490
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   491
goal thy "analz (Key``N) = Key``N";
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   492
by (Auto_tac());
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   493
by (etac analz.induct 1);
2026
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   494
by (Auto_tac());
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   495
qed "analz_image_Key";
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   496
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   497
Addsimps [analz_image_Key];
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   498
0df5a96bf77e Last working version prior to introduction of "lost"
paulson
parents: 2011
diff changeset
   499
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   500
(** Idempotence and transitivity **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   501
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   502
goal thy "!!H. X: analz (analz H) ==> X: analz H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   503
by (etac analz.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   504
by (ALLGOALS Blast_tac);
2922
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   505
qed "analz_analzD";
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   506
AddSDs [analz_analzD];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   507
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   508
goal thy "analz (analz H) = analz H";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   509
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   510
qed "analz_idem";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   511
Addsimps [analz_idem];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   512
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   513
goal thy "!!H. [| X: analz G;  G <= analz H |] ==> X: analz H";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   514
by (dtac analz_mono 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   515
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   516
qed "analz_trans";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   517
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   518
(*Cut; Lemma 2 of Lowe*)
1998
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   519
goal thy "!!H. [| Y: analz (insert X H);  X: analz H |] ==> Y: analz H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   520
by (etac analz_trans 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   521
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   522
qed "analz_cut";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   523
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   524
(*Cut can be proved easily by induction on
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   525
   "!!H. Y: analz (insert X H) ==> X: analz H --> Y: analz H"
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   526
*)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   527
3449
6b17f82bbf01 New comments; a tidied proof
paulson
parents: 3431
diff changeset
   528
(*This rewrite rule helps in the simplification of messages that involve
6b17f82bbf01 New comments; a tidied proof
paulson
parents: 3431
diff changeset
   529
  the forwarding of unknown components (X).  Without it, removing occurrences
6b17f82bbf01 New comments; a tidied proof
paulson
parents: 3431
diff changeset
   530
  of X can be very complicated. *)
3431
05b397185e1d Useful new lemma
paulson
parents: 3121
diff changeset
   531
goal thy "!!H. X: analz H ==> analz (insert X H) = analz H";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   532
by (blast_tac (claset() addIs [analz_cut, analz_insertI]) 1);
3431
05b397185e1d Useful new lemma
paulson
parents: 3121
diff changeset
   533
qed "analz_insert_eq";
05b397185e1d Useful new lemma
paulson
parents: 3121
diff changeset
   534
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   535
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   536
(** A congruence rule for "analz" **)
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   537
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   538
goal thy "!!H. [| analz G <= analz G'; analz H <= analz H' \
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   539
\              |] ==> analz (G Un H) <= analz (G' Un H')";
3714
ab3b4ceb61dc Deleted obsolete version of clarify_tac
paulson
parents: 3702
diff changeset
   540
by (Clarify_tac 1);
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   541
by (etac analz.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   542
by (ALLGOALS (best_tac (claset() addIs [analz_mono RS subsetD])));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   543
qed "analz_subset_cong";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   544
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   545
goal thy "!!H. [| analz G = analz G'; analz H = analz H' \
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   546
\              |] ==> analz (G Un H) = analz (G' Un H')";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   547
by (REPEAT_FIRST (ares_tac [equalityI, analz_subset_cong]
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   548
          ORELSE' etac equalityE));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   549
qed "analz_cong";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   550
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   551
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   552
goal thy "!!H. analz H = analz H' ==> analz(insert X H) = analz(insert X H')";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   553
by (asm_simp_tac (simpset() addsimps [insert_def] delsimps [singleton_conv]
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   554
                           setloop (rtac analz_cong)) 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   555
qed "analz_insert_cong";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   556
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   557
(*If there are no pairs or encryptions then analz does nothing*)
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   558
goal thy "!!H. [| ALL X Y. {|X,Y|} ~: H;  ALL X K. Crypt K X ~: H |] ==> \
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   559
\         analz H = H";
3730
6933d20f335f Step_tac -> Safe_tac
paulson
parents: 3714
diff changeset
   560
by Safe_tac;
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   561
by (etac analz.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   562
by (ALLGOALS Blast_tac);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   563
qed "analz_trivial";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   564
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   565
(*These two are obsolete (with a single Spy) but cost little to prove...*)
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   566
goal thy "!!X. X: analz (UN i:A. analz (H i)) ==> X: analz (UN i:A. H i)";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   567
by (etac analz.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   568
by (ALLGOALS (blast_tac (claset() addIs [impOfSubs analz_mono])));
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   569
val lemma = result();
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   570
4157
200f897f0858 generalized UNION1 to UNION
paulson
parents: 4091
diff changeset
   571
goal thy "analz (UN i:A. analz (H i)) = analz (UN i:A. H i)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   572
by (blast_tac (claset() addIs [lemma, impOfSubs analz_mono]) 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   573
qed "analz_UN_analz";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   574
Addsimps [analz_UN_analz];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   575
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   576
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   577
(**** Inductive relation "synth" ****)
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   578
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   579
AddIs  synth.intrs;
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   580
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   581
(*Can only produce a nonce or key if it is already known,
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   582
  but can synth a pair or encryption from its components...*)
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   583
val mk_cases = synth.mk_cases (atomic.simps @ msg.simps);
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   584
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   585
(*NO Agent_synth, as any Agent name can be synthesized.  Ditto for Number*)
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   586
val Nonce_synth = mk_cases "Nonce n : synth H";
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   587
val Key_synth   = mk_cases "Key K : synth H";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   588
val Hash_synth  = mk_cases "Hash X : synth H";
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   589
val MPair_synth = mk_cases "{|X,Y|} : synth H";
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   590
val Crypt_synth = mk_cases "Crypt K X : synth H";
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   591
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   592
AddSEs [Nonce_synth, Key_synth, Hash_synth, MPair_synth, Crypt_synth];
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   593
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   594
goal thy "H <= synth(H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   595
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   596
qed "synth_increasing";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   597
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   598
(*Monotonicity*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   599
goalw thy synth.defs "!!G H. G<=H ==> synth(G) <= synth(H)";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   600
by (rtac lfp_mono 1);
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   601
by (REPEAT (ares_tac basic_monos 1));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   602
qed "synth_mono";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   603
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   604
(** Unions **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   605
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   606
(*Converse fails: we can synth more from the union than from the 
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   607
  separate parts, building a compound message using elements of each.*)
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   608
goal thy "synth(G) Un synth(H) <= synth(G Un H)";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   609
by (REPEAT (ares_tac [Un_least, synth_mono, Un_upper1, Un_upper2] 1));
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   610
qed "synth_Un";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   611
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   612
goal thy "insert X (synth H) <= synth(insert X H)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   613
by (blast_tac (claset() addIs [impOfSubs synth_mono]) 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   614
qed "synth_insert";
1885
a18a6dc14f76 Auth proofs work up to the XXX...
paulson
parents: 1852
diff changeset
   615
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   616
(** Idempotence and transitivity **)
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   617
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   618
goal thy "!!H. X: synth (synth H) ==> X: synth H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   619
by (etac synth.induct 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   620
by (ALLGOALS Blast_tac);
2922
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   621
qed "synth_synthD";
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   622
AddSDs [synth_synthD];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   623
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   624
goal thy "synth (synth H) = synth H";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   625
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   626
qed "synth_idem";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   627
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   628
goal thy "!!H. [| X: synth G;  G <= synth H |] ==> X: synth H";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   629
by (dtac synth_mono 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   630
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   631
qed "synth_trans";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   632
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   633
(*Cut; Lemma 2 of Lowe*)
1998
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   634
goal thy "!!H. [| Y: synth (insert X H);  X: synth H |] ==> Y: synth H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   635
by (etac synth_trans 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   636
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   637
qed "synth_cut";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   638
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   639
goal thy "Agent A : synth H";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   640
by (Blast_tac 1);
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   641
qed "Agent_synth";
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   642
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   643
goal thy "Number n : synth H";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   644
by (Blast_tac 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   645
qed "Number_synth";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   646
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   647
goal thy "(Nonce N : synth H) = (Nonce N : H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   648
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   649
qed "Nonce_synth_eq";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   650
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   651
goal thy "(Key K : synth H) = (Key K : H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   652
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   653
qed "Key_synth_eq";
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   654
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   655
goal thy "!!K. Key K ~: H ==> (Crypt K X : synth H) = (Crypt K X : H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   656
by (Blast_tac 1);
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   657
qed "Crypt_synth_eq";
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   658
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   659
Addsimps [Agent_synth, Number_synth, 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   660
	  Nonce_synth_eq, Key_synth_eq, Crypt_synth_eq];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   661
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   662
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   663
goalw thy [keysFor_def]
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   664
    "keysFor (synth H) = keysFor H Un invKey``{K. Key K : H}";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   665
by (Blast_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   666
qed "keysFor_synth";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   667
Addsimps [keysFor_synth];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   668
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   669
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   670
(*** Combinations of parts, analz and synth ***)
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   671
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   672
goal thy "parts (synth H) = parts H Un synth H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   673
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   674
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   675
by (etac parts.induct 1);
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   676
by (ALLGOALS
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   677
    (blast_tac (claset() addIs ((synth_increasing RS parts_mono RS subsetD)
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   678
                             ::parts.intrs))));
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   679
qed "parts_synth";
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   680
Addsimps [parts_synth];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   681
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   682
goal thy "analz (analz G Un H) = analz (G Un H)";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   683
by (REPEAT_FIRST (resolve_tac [equalityI, analz_subset_cong]));
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   684
by (ALLGOALS Simp_tac);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   685
qed "analz_analz_Un";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   686
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   687
goal thy "analz (synth G Un H) = analz (G Un H) Un synth G";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   688
by (rtac equalityI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   689
by (rtac subsetI 1);
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   690
by (etac analz.induct 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   691
by (blast_tac (claset() addIs [impOfSubs analz_mono]) 5);
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   692
by (ALLGOALS (blast_tac (claset() addIs analz.intrs)));
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   693
qed "analz_synth_Un";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   694
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   695
goal thy "analz (synth H) = analz H Un synth H";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   696
by (cut_inst_tac [("H","{}")] analz_synth_Un 1);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   697
by (Full_simp_tac 1);
1913
2809adb15eb0 Renaming of functions, and tidying
paulson
parents: 1893
diff changeset
   698
qed "analz_synth";
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   699
Addsimps [analz_analz_Un, analz_synth_Un, analz_synth];
1839
199243afac2b Proving safety properties of authentication protocols
paulson
parents:
diff changeset
   700
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   701
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   702
(** For reasoning about the Fake rule in traces **)
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   703
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   704
goal thy "!!Y. X: G ==> parts(insert X H) <= parts G Un parts H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   705
by (rtac ([parts_mono, parts_Un_subset2] MRS subset_trans) 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   706
by (Blast_tac 1);
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   707
qed "parts_insert_subset_Un";
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   708
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   709
(*More specifically for Fake*)
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   710
goal thy "!!H. X: synth (analz G) ==> \
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   711
\              parts (insert X H) <= synth (analz G) Un parts G Un parts H";
2032
1bbf1bdcaf56 Introduction of "lost" argument
paulson
parents: 2028
diff changeset
   712
by (dtac parts_insert_subset_Un 1);
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   713
by (Full_simp_tac 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   714
by (Blast_tac 1);
1946
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   715
qed "Fake_parts_insert";
b59a3d686436 New theorems for Fake case
paulson
parents: 1929
diff changeset
   716
2061
b14a08bf61bf New theorem Crypt_Fake_parts_insert
paulson
parents: 2032
diff changeset
   717
goal thy
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   718
     "!!H. [| Crypt K Y : parts (insert X H);  X: synth (analz G);  \
2061
b14a08bf61bf New theorem Crypt_Fake_parts_insert
paulson
parents: 2032
diff changeset
   719
\             Key K ~: analz G |]                                   \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   720
\          ==> Crypt K Y : parts G Un parts H";
2061
b14a08bf61bf New theorem Crypt_Fake_parts_insert
paulson
parents: 2032
diff changeset
   721
by (dtac (impOfSubs Fake_parts_insert) 1);
2170
c5e460f1ebb4 Ran expandshort
paulson
parents: 2154
diff changeset
   722
by (assume_tac 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   723
by (blast_tac (claset() addDs [impOfSubs analz_subset_parts]) 1);
2061
b14a08bf61bf New theorem Crypt_Fake_parts_insert
paulson
parents: 2032
diff changeset
   724
qed "Crypt_Fake_parts_insert";
b14a08bf61bf New theorem Crypt_Fake_parts_insert
paulson
parents: 2032
diff changeset
   725
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   726
goal thy "!!H. X: synth (analz G) ==> \
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   727
\              analz (insert X H) <= synth (analz G) Un analz (G Un H)";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   728
by (rtac subsetI 1);
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   729
by (subgoal_tac "x : analz (synth (analz G) Un H)" 1);
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   730
by (blast_tac (claset() addIs [impOfSubs analz_mono,
2922
580647a879cf Using Blast_tac
paulson
parents: 2891
diff changeset
   731
			      impOfSubs (analz_mono RS synth_mono)]) 2);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   732
by (Full_simp_tac 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   733
by (Blast_tac 1);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   734
qed "Fake_analz_insert";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   735
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   736
goal thy "(X: analz H & X: parts H) = (X: analz H)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   737
by (blast_tac (claset() addIs [impOfSubs analz_subset_parts]) 1);
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   738
val analz_conj_parts = result();
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   739
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   740
goal thy "(X: analz H | X: parts H) = (X: parts H)";
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   741
by (blast_tac (claset() addIs [impOfSubs analz_subset_parts]) 1);
2011
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   742
val analz_disj_parts = result();
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   743
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   744
AddIffs [analz_conj_parts, analz_disj_parts];
d9af64c26be6 New laws for messages
paulson
parents: 1998
diff changeset
   745
1998
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   746
(*Without this equation, other rules for synth and analz would yield
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   747
  redundant cases*)
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   748
goal thy "({|X,Y|} : synth (analz H)) = \
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   749
\         (X : synth (analz H) & Y : synth (analz H))";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   750
by (Blast_tac 1);
1998
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   751
qed "MPair_synth_analz";
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   752
f8230821f1e8 Reordering of premises for cut theorems, and new law MPair_synth_analz
paulson
parents: 1994
diff changeset
   753
AddIffs [MPair_synth_analz];
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   754
2154
913b4fc7670a New, purely illustrative result Crypt_synth_analz
paulson
parents: 2102
diff changeset
   755
goal thy "!!K. [| Key K : analz H;  Key (invKey K) : analz H |] \
2284
80ebd1a213fd Swapped arguments of Crypt (for clarity and because it is conventional)
paulson
parents: 2170
diff changeset
   756
\              ==> (Crypt K X : synth (analz H)) = (X : synth (analz H))";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   757
by (Blast_tac 1);
2154
913b4fc7670a New, purely illustrative result Crypt_synth_analz
paulson
parents: 2102
diff changeset
   758
qed "Crypt_synth_analz";
913b4fc7670a New, purely illustrative result Crypt_synth_analz
paulson
parents: 2102
diff changeset
   759
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   760
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   761
goal thy "!!K. X ~: synth (analz H) \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   762
\   ==> (Hash{|X,Y|} : synth (analz H)) = (Hash{|X,Y|} : analz H)";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   763
by (Blast_tac 1);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   764
qed "Hash_synth_analz";
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   765
Addsimps [Hash_synth_analz];
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   766
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   767
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   768
(**** HPair: a combination of Hash and MPair ****)
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   769
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   770
(*** Freeness ***)
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   771
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   772
goalw thy [HPair_def] "Agent A ~= Hash[X] Y";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   773
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   774
qed "Agent_neq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   775
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   776
goalw thy [HPair_def] "Nonce N ~= Hash[X] Y";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   777
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   778
qed "Nonce_neq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   779
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   780
goalw thy [HPair_def] "Number N ~= Hash[X] Y";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   781
by (Simp_tac 1);
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   782
qed "Number_neq_HPair";
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   783
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   784
goalw thy [HPair_def] "Key K ~= Hash[X] Y";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   785
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   786
qed "Key_neq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   787
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   788
goalw thy [HPair_def] "Hash Z ~= Hash[X] Y";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   789
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   790
qed "Hash_neq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   791
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   792
goalw thy [HPair_def] "Crypt K X' ~= Hash[X] Y";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   793
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   794
qed "Crypt_neq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   795
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   796
val HPair_neqs = [Agent_neq_HPair, Nonce_neq_HPair, Number_neq_HPair, 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   797
                  Key_neq_HPair, Hash_neq_HPair, Crypt_neq_HPair];
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   798
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   799
AddIffs HPair_neqs;
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   800
AddIffs (HPair_neqs RL [not_sym]);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   801
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   802
goalw thy [HPair_def] "(Hash[X'] Y' = Hash[X] Y) = (X' = X & Y'=Y)";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   803
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   804
qed "HPair_eq";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   805
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   806
goalw thy [HPair_def] "({|X',Y'|} = Hash[X] Y) = (X' = Hash{|X,Y|} & Y'=Y)";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   807
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   808
qed "MPair_eq_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   809
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   810
goalw thy [HPair_def] "(Hash[X] Y = {|X',Y'|}) = (X' = Hash{|X,Y|} & Y'=Y)";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   811
by (Auto_tac());
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   812
qed "HPair_eq_MPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   813
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   814
AddIffs [HPair_eq, MPair_eq_HPair, HPair_eq_MPair];
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   815
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   816
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   817
(*** Specialized laws, proved in terms of those for Hash and MPair ***)
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   818
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   819
goalw thy [HPair_def] "keysFor (insert (Hash[X] Y) H) = keysFor H";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   820
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   821
qed "keysFor_insert_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   822
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   823
goalw thy [HPair_def]
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   824
    "parts (insert (Hash[X] Y) H) = \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   825
\    insert (Hash[X] Y) (insert (Hash{|X,Y|}) (parts (insert Y H)))";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   826
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   827
qed "parts_insert_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   828
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   829
goalw thy [HPair_def]
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   830
    "analz (insert (Hash[X] Y) H) = \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   831
\    insert (Hash[X] Y) (insert (Hash{|X,Y|}) (analz (insert Y H)))";
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   832
by (Simp_tac 1);
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   833
qed "analz_insert_HPair";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   834
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   835
goalw thy [HPair_def] "!!H. X ~: synth (analz H) \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   836
\   ==> (Hash[X] Y : synth (analz H)) = \
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   837
\       (Hash {|X, Y|} : analz H & Y : synth (analz H))";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   838
by (Simp_tac 1);
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   839
by (Blast_tac 1);
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   840
qed "HPair_synth_analz";
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   841
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   842
Addsimps [keysFor_insert_HPair, parts_insert_HPair, analz_insert_HPair, 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   843
          HPair_synth_analz, HPair_synth_analz];
2484
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   844
596a5b5a68ff Incorporation of HPair into Message
paulson
parents: 2415
diff changeset
   845
1929
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   846
(*We do NOT want Crypt... messages broken up in protocols!!*)
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   847
Delrules partsEs;
f0839bab4b00 Working version of NS, messages 1-3, WITH INTERLEAVING
paulson
parents: 1913
diff changeset
   848
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   849
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   850
(** Rewrites to push in Key and Crypt messages, so that other messages can
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   851
    be pulled out using the analz_insert rules **)
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   852
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   853
fun insComm thy x y = read_instantiate_sg (sign_of thy) [("x",x), ("y",y)] 
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   854
                          insert_commute;
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   855
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   856
val pushKeys = map (insComm thy "Key ?K") 
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   857
                   ["Agent ?C", "Nonce ?N", "Number ?N", 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   858
		    "Hash ?X", "MPair ?X ?Y", "Crypt ?X ?K'"];
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   859
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   860
val pushCrypts = map (insComm thy "Crypt ?X ?K") 
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   861
                     ["Agent ?C", "Nonce ?N", "Number ?N", 
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   862
		      "Hash ?X'", "MPair ?X' ?Y"];
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   863
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   864
(*Cannot be added with Addsimps -- we don't always want to re-order messages*)
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   865
val pushes = pushKeys@pushCrypts;
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   866
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   867
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   868
(*** Tactics useful for many protocol proofs ***)
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   869
3470
8160cc3f6d40 Added a comment
paulson
parents: 3449
diff changeset
   870
(*Prove base case (subgoal i) and simplify others.  A typical base case
3683
aafe719dff14 Global change: lost->bad and sees Spy->spies
paulson
parents: 3668
diff changeset
   871
  concerns  Crypt K X ~: Key``shrK``bad  and cannot be proved by rewriting
3470
8160cc3f6d40 Added a comment
paulson
parents: 3449
diff changeset
   872
  alone.*)
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   873
fun prove_simple_subgoals_tac i = 
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   874
    fast_tac (claset() addss (simpset())) i THEN
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   875
    ALLGOALS Asm_simp_tac;
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   876
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   877
fun Fake_parts_insert_tac i = 
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   878
    blast_tac (claset() addDs [impOfSubs analz_subset_parts,
3121
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   879
			      impOfSubs Fake_parts_insert]) i;
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   880
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   881
(*Apply rules to break down assumptions of the form
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   882
  Y : parts(insert X H)  and  Y : analz(insert X H)
cbb6c0c1c58a Conversion to use blast_tac (with other improvements)
paulson
parents: 3102
diff changeset
   883
*)
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   884
val Fake_insert_tac = 
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   885
    dresolve_tac [impOfSubs Fake_analz_insert,
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   886
                  impOfSubs Fake_parts_insert] THEN'
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   887
    eresolve_tac [asm_rl, synth.Inj];
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   888
3702
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
   889
fun Fake_insert_simp_tac i = 
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
   890
    REPEAT (Fake_insert_tac i) THEN Asm_full_simp_tac i;
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
   891
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
   892
3449
6b17f82bbf01 New comments; a tidied proof
paulson
parents: 3431
diff changeset
   893
(*Analysis of Fake cases.  Also works for messages that forward unknown parts,
6b17f82bbf01 New comments; a tidied proof
paulson
parents: 3431
diff changeset
   894
  but this application is no longer necessary if analz_insert_eq is used.
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   895
  Abstraction over i is ESSENTIAL: it delays the dereferencing of claset
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   896
  DEPENDS UPON "X" REFERRING TO THE FRADULENT MESSAGE *)
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   897
fun spy_analz_tac i =
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   898
  DETERM
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   899
   (SELECT_GOAL
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   900
     (EVERY 
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   901
      [  (*push in occurrences of X...*)
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   902
       (REPEAT o CHANGED)
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   903
           (res_inst_tac [("x1","X")] (insert_commute RS ssubst) 1),
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   904
       (*...allowing further simplifications*)
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   905
       simp_tac (simpset() addsplits [expand_if]) 1,
3476
1be4fee7606b spy_analz_tac: Restored iffI to the list of rules used to break down
paulson
parents: 3470
diff changeset
   906
       REPEAT (FIRSTGOAL (resolve_tac [allI,impI,notI,conjI,iffI])),
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   907
       DEPTH_SOLVE 
3702
0fc9bf467f95 clarify_tac and a new simprule
paulson
parents: 3684
diff changeset
   908
         (Fake_insert_simp_tac 1
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   909
          THEN
3102
4d01cdc119d2 Some blast_tac calls; more needed
paulson
parents: 2948
diff changeset
   910
          IF_UNSOLVED (Blast.depth_tac
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   911
		       (claset() addIs [analz_insertI,
3668
a39baf59ea47 Split base cases from "msg" to "atomic" in order
paulson
parents: 3650
diff changeset
   912
				       impOfSubs analz_subset_parts]) 4 1))
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   913
       ]) i);
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   914
2415
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   915
(** Useful in many uniqueness proofs **)
2327
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   916
fun ex_strip_tac i = REPEAT (swap_res_tac [exI, conjI] i) THEN 
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   917
                     assume_tac (i+1);
00ac25b2791d Moved much common material to Message.ML
paulson
parents: 2284
diff changeset
   918
2415
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   919
(*Apply the EX-ALL quantifification to prove uniqueness theorems in 
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   920
  their standard form*)
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   921
fun prove_unique_tac lemma = 
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   922
  EVERY' [dtac lemma,
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   923
          REPEAT o (mp_tac ORELSE' eresolve_tac [asm_rl,exE]),
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   924
          (*Duplicate the assumption*)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2484
diff changeset
   925
          forw_inst_tac [("psi", "ALL C.?P(C)")] asm_rl,
4091
771b1f6422a8 isatool fixclasimp;
wenzelm
parents: 3919
diff changeset
   926
          Blast.depth_tac (claset() addSDs [spec]) 0];
2415
46de4b035f00 New tactic: prove_unique_tac
paulson
parents: 2373
diff changeset
   927
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   928
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   929
(*Needed occasionally with spy_analz_tac, e.g. in analz_insert_Key_newK*)
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   930
goal Set.thy "A Un (B Un A) = B Un A";
2891
d8f254ad1ab9 Calls Blast_tac
paulson
parents: 2637
diff changeset
   931
by (Blast_tac 1);
2373
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   932
val Un_absorb3 = result();
490ffa16952e Addition of the Hash constructor
paulson
parents: 2327
diff changeset
   933
Addsimps [Un_absorb3];
3514
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   934
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   935
(*By default only o_apply is built-in.  But in the presence of eta-expansion
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   936
  this means that some terms displayed as (f o g) will be rewritten, and others
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   937
  will not!*)
eb16b8e8d872 Moved some declarations to Message from Public and Shared
paulson
parents: 3476
diff changeset
   938
Addsimps [o_def];