src/HOL/Auth/Recur.ML
author paulson
Fri, 17 Jan 1997 12:49:31 +0100
changeset 2516 4d68fbe6378b
parent 2485 c4368c967c56
child 2533 2d5604a51562
permissions -rw-r--r--
Now with Andy Gordon's treatment of freshness to replace newN/K
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     1
(*  Title:      HOL/Auth/Recur
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     2
    ID:         $Id$
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     3
    Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     4
    Copyright   1996  University of Cambridge
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     5
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     6
Inductive relation "recur" for the Recursive Authentication protocol.
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     7
*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     8
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
     9
open Recur;
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    10
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    11
proof_timing:=true;
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    12
HOL_quantifiers := false;
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    13
Pretty.setdepth 30;
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    14
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    15
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    16
(** Possibility properties: traces that reach the end 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    17
        ONE theorem would be more elegant and faster!
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    18
        By induction on a list of agents (no repetitions)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    19
**)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    20
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    21
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    22
(*Simplest case: Alice goes directly to the server*)
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
    23
goal thy
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    24
 "!!A. A ~= Server   \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    25
\ ==> EX K NA. EX evs: recur lost.          \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    26
\     Says Server A {|Crypt (shrK A) {|Key K, Agent Server, Nonce NA|}, \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    27
\                       Agent Server|}      \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    28
\         : set_of_list evs";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    29
by (REPEAT (resolve_tac [exI,bexI] 1));
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
    30
by (rtac (recur.Nil RS recur.RA1 RS 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    31
          (respond.One RSN (4,recur.RA3))) 2);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    32
by possibility_tac;
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    33
result();
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    34
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    35
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    36
(*Case two: Alice, Bob and the server*)
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
    37
goal thy
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    38
 "!!A B. [| A ~= B; A ~= Server; B ~= Server |]   \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    39
\ ==> EX K. EX NA. EX evs: recur lost.          \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    40
\       Says B A {|Crypt (shrK A) {|Key K, Agent B, Nonce NA|}, \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    41
\                       Agent Server|}                          \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    42
\         : set_of_list evs";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    43
by (cut_facts_tac [Nonce_supply2, Key_supply2] 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    44
by (REPEAT (eresolve_tac [exE, conjE] 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    45
by (REPEAT (resolve_tac [exI,bexI] 1));
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
    46
by (rtac (recur.Nil RS recur.RA1 RS recur.RA2 RS 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    47
          (respond.One RS respond.Cons RSN (4,recur.RA3)) RS
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    48
          recur.RA4) 2);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    49
by basic_possibility_tac;
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    50
by (DEPTH_SOLVE (eresolve_tac [asm_rl, less_not_refl2, 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    51
			       less_not_refl2 RS not_sym] 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    52
result();
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    53
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    54
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    55
(*Case three: Alice, Bob, Charlie and the server
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
    56
goal thy
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    57
 "!!A B. [| A ~= B; B ~= C; A ~= Server; B ~= Server; C ~= Server |]   \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    58
\ ==> EX K. EX NA. EX evs: recur lost.          \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    59
\       Says B A {|Crypt (shrK A) {|Key K, Agent B, Nonce NA|}, \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    60
\                       Agent Server|}                          \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    61
\         : set_of_list evs";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    62
by (cut_facts_tac [Nonce_supply3, Key_supply3] 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    63
by (REPEAT (eresolve_tac [exE, conjE] 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    64
by (REPEAT (resolve_tac [exI,bexI] 1));
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
    65
by (rtac (recur.Nil RS recur.RA1 RS recur.RA2 RS recur.RA2 RS 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    66
          (respond.One RS respond.Cons RS respond.Cons RSN
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    67
           (4,recur.RA3)) RS recur.RA4 RS recur.RA4) 2);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    68
(*SLOW: 70 seconds*)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    69
by basic_possibility_tac;
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    70
by (DEPTH_SOLVE (swap_res_tac [refl, conjI, disjCI] 1 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    71
		 ORELSE
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    72
		 eresolve_tac [asm_rl, less_not_refl2, 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    73
			       less_not_refl2 RS not_sym] 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    74
result();
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    75
****************)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    76
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    77
(**** Inductive proofs about recur ****)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    78
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    79
(*Monotonicity*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    80
goal thy "!!evs. lost' <= lost ==> recur lost' <= recur lost";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    81
by (rtac subsetI 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    82
by (etac recur.induct 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    83
by (REPEAT_FIRST
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    84
    (best_tac (!claset addIs (impOfSubs (sees_mono RS analz_mono RS synth_mono)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    85
                              :: recur.intrs))));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    86
qed "recur_mono";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    87
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    88
(*Nobody sends themselves messages*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    89
goal thy "!!evs. evs : recur lost ==> ALL A X. Says A A X ~: set_of_list evs";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    90
by (etac recur.induct 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    91
by (Auto_tac());
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    92
qed_spec_mp "not_Says_to_self";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    93
Addsimps [not_Says_to_self];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    94
AddSEs   [not_Says_to_self RSN (2, rev_notE)];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    95
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
    96
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    97
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    98
goal thy "!!evs. (PA,RB,KAB) : respond evs ==> Key KAB : parts{RB}";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
    99
by (etac respond.induct 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   100
by (ALLGOALS Simp_tac);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   101
qed "respond_Key_in_parts";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   102
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   103
goal thy "!!evs. (PA,RB,KAB) : respond evs ==> Key KAB ~: used evs";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   104
by (etac respond.induct 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   105
by (REPEAT (assume_tac 1));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   106
qed "respond_imp_not_used";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   107
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   108
goal thy
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   109
 "!!evs. [| Key K : parts {RB};  (PB,RB,K') : respond evs |] \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   110
\        ==> Key K ~: used evs";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   111
by (etac rev_mp 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   112
by (etac respond.induct 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   113
by (auto_tac(!claset addDs [Key_not_used, respond_imp_not_used],
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   114
             !simpset));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   115
qed_spec_mp "Key_in_parts_respond";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   116
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   117
(*Simple inductive reasoning about responses*)
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   118
goal thy "!!evs. (PA,RB,KAB) : respond evs ==> RB : responses evs";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   119
by (etac respond.induct 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   120
by (REPEAT (ares_tac (respond_imp_not_used::responses.intrs) 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   121
qed "respond_imp_responses";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   122
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   123
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   124
(** For reasoning about the encrypted portion of messages **)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   125
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   126
val RA2_analz_sees_Spy = Says_imp_sees_Spy RS analz.Inj |> standard;
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   127
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   128
goal thy "!!evs. Says C' B {|X, X', RA|} : set_of_list evs \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   129
\                ==> RA : analz (sees lost Spy evs)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   130
by (fast_tac (!claset addSDs [Says_imp_sees_Spy RS analz.Inj]) 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   131
qed "RA4_analz_sees_Spy";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   132
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   133
(*RA2_analz... and RA4_analz... let us treat those cases using the same 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   134
  argument as for the Fake case.  This is possible for most, but not all,
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   135
  proofs: Fake does not invent new nonces (as in RA2), and of course Fake
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   136
  messages originate from the Spy. *)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   137
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   138
bind_thm ("RA2_parts_sees_Spy",
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   139
          RA2_analz_sees_Spy RS (impOfSubs analz_subset_parts));
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   140
bind_thm ("RA4_parts_sees_Spy",
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   141
          RA4_analz_sees_Spy RS (impOfSubs analz_subset_parts));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   142
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   143
(*We instantiate the variable to "lost".  Leaving it as a Var makes proofs
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   144
  harder to complete, since simplification does less for us.*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   145
val parts_Fake_tac = 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   146
    let val tac = forw_inst_tac [("lost","lost")] 
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   147
    in  tac RA2_parts_sees_Spy 4              THEN
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   148
        etac subst 4 (*RA2: DELETE needless definition of PA!*)  THEN
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   149
        forward_tac [respond_imp_responses] 5 THEN
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   150
        tac RA4_parts_sees_Spy 6
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   151
    end;
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   152
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   153
(*For proving the easier theorems about X ~: parts (sees lost Spy evs) *)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   154
fun parts_induct_tac i = SELECT_GOAL
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   155
    (DETERM (etac recur.induct 1 THEN parts_Fake_tac THEN
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   156
             (*Fake message*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   157
             TRY (best_tac (!claset addDs [impOfSubs analz_subset_parts,
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   158
                                           impOfSubs Fake_parts_insert]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   159
                                    addss (!simpset)) 2)) THEN
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   160
     (*Base case*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   161
     fast_tac (!claset addss (!simpset)) 1 THEN
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   162
     ALLGOALS Asm_simp_tac) i;
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   163
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   164
(** Theorems of the form X ~: parts (sees lost Spy evs) imply that NOBODY
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   165
    sends messages containing X! **)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   166
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   167
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   168
(** Spy never sees another agent's long-term key (unless initially lost) **)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   169
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   170
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   171
 "!!evs. evs : recur lost \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   172
\        ==> (Key (shrK A) : parts (sees lost Spy evs)) = (A : lost)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   173
by (parts_induct_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   174
(*RA2*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   175
by (best_tac (!claset addSEs partsEs addSDs [parts_cut]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   176
                      addss (!simpset)) 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   177
(*RA3*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   178
by (fast_tac (!claset addDs [Key_in_parts_respond]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   179
                      addss (!simpset addsimps [parts_insert_sees])) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   180
qed "Spy_see_shrK";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   181
Addsimps [Spy_see_shrK];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   182
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   183
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   184
 "!!evs. evs : recur lost \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   185
\        ==> (Key (shrK A) : analz (sees lost Spy evs)) = (A : lost)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   186
by (auto_tac(!claset addDs [impOfSubs analz_subset_parts], !simpset));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   187
qed "Spy_analz_shrK";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   188
Addsimps [Spy_analz_shrK];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   189
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   190
goal thy  "!!A. [| Key (shrK A) : parts (sees lost Spy evs);       \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   191
\                  evs : recur lost |] ==> A:lost";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   192
by (fast_tac (!claset addDs [Spy_see_shrK]) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   193
qed "Spy_see_shrK_D";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   194
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   195
bind_thm ("Spy_analz_shrK_D", analz_subset_parts RS subsetD RS Spy_see_shrK_D);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   196
AddSDs [Spy_see_shrK_D, Spy_analz_shrK_D];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   197
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   198
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   199
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   200
(** Nobody can have used non-existent keys! **)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   201
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   202
goal thy
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   203
 "!!evs. [| K : keysFor (parts {RB});  (PB,RB,K') : respond evs |] \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   204
\        ==> K : range shrK";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   205
by (etac rev_mp 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   206
by (etac (respond_imp_responses RS responses.induct) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   207
by (Auto_tac());
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   208
qed_spec_mp "Key_in_keysFor_parts";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   209
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   210
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   211
goal thy "!!evs. evs : recur lost ==>          \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   212
\       Key K ~: used evs --> K ~: keysFor (parts (sees lost Spy evs))";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   213
by (parts_induct_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   214
(*RA3*)
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   215
by (best_tac (!claset addDs  [Key_in_keysFor_parts]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   216
                      addss  (!simpset addsimps [parts_insert_sees])) 2);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   217
(*Fake*)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   218
by (best_tac
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   219
      (!claset addIs [impOfSubs analz_subset_parts]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   220
               addDs [impOfSubs (analz_subset_parts RS keysFor_mono),
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   221
                      impOfSubs (parts_insert_subset_Un RS keysFor_mono)]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   222
               addss (!simpset)) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   223
qed_spec_mp "new_keys_not_used";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   224
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   225
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   226
bind_thm ("new_keys_not_analzd",
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   227
          [analz_subset_parts RS keysFor_mono,
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   228
           new_keys_not_used] MRS contra_subsetD);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   229
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   230
Addsimps [new_keys_not_used, new_keys_not_analzd];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   231
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   232
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   233
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   234
(*** Proofs involving analz ***)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   235
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   236
(*For proofs involving analz.  We again instantiate the variable to "lost".*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   237
val analz_Fake_tac = 
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   238
    etac subst 4 (*RA2: DELETE needless definition of PA!*)  THEN
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   239
    dres_inst_tac [("lost","lost")] RA2_analz_sees_Spy 4 THEN 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   240
    forward_tac [respond_imp_responses] 5                THEN
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   241
    dres_inst_tac [("lost","lost")] RA4_analz_sees_Spy 6;
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   242
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   243
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   244
(** Session keys are not used to encrypt other session keys **)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   245
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   246
(*Version for "responses" relation.  Handles case RA3 in the theorem below.  
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   247
  Note that it holds for *any* set H (not just "sees lost Spy evs")
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   248
  satisfying the inductive hypothesis.*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   249
goal thy  
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   250
 "!!evs. [| RB : responses evs;                             \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   251
\           ALL K KK. KK <= Compl (range shrK) -->          \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   252
\                     (Key K : analz (Key``KK Un H)) =      \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   253
\                     (K : KK | Key K : analz H) |]         \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   254
\       ==> ALL K KK. KK <= Compl (range shrK) -->          \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   255
\                     (Key K : analz (insert RB (Key``KK Un H))) = \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   256
\                     (K : KK | Key K : analz (insert RB H))";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   257
by (etac responses.induct 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   258
by (ALLGOALS (asm_simp_tac analz_image_freshK_ss));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   259
qed "resp_analz_image_freshK_lemma";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   260
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   261
(*Version for the protocol.  Proof is almost trivial, thanks to the lemma.*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   262
goal thy  
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   263
 "!!evs. evs : recur lost ==>                                   \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   264
\  ALL K KK. KK <= Compl (range shrK) -->                       \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   265
\            (Key K : analz (Key``KK Un (sees lost Spy evs))) = \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   266
\            (K : KK | Key K : analz (sees lost Spy evs))";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   267
by (etac recur.induct 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   268
by analz_Fake_tac;
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   269
by (REPEAT_FIRST (resolve_tac [allI, impI]));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   270
by (REPEAT_FIRST (rtac analz_image_freshK_lemma ));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   271
by (ALLGOALS 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   272
    (asm_simp_tac
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   273
     (analz_image_freshK_ss addsimps [resp_analz_image_freshK_lemma])));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   274
(*Base*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   275
by (fast_tac (!claset addIs [image_eqI] addss (!simpset)) 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   276
(*RA4, RA2, Fake*) 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   277
by (REPEAT (spy_analz_tac 1));
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   278
val raw_analz_image_freshK = result();
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   279
qed_spec_mp "analz_image_freshK";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   280
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   281
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   282
(*Instance of the lemma with H replaced by (sees lost Spy evs):
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   283
   [| RB : responses evs;  evs : recur lost; |]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   284
   ==> KK <= Compl (range shrK) --> 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   285
       Key K : analz (insert RB (Key``KK Un sees lost Spy evs)) =
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   286
       (K : KK | Key K : analz (insert RB (sees lost Spy evs))) 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   287
*)
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   288
bind_thm ("resp_analz_image_freshK",
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   289
          raw_analz_image_freshK RSN
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   290
            (2, resp_analz_image_freshK_lemma) RS spec RS spec);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   291
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   292
goal thy
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   293
 "!!evs. [| evs : recur lost;  KAB ~: range shrK |] ==>              \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   294
\        Key K : analz (insert (Key KAB) (sees lost Spy evs)) =      \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   295
\        (K = KAB | Key K : analz (sees lost Spy evs))";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   296
by (asm_simp_tac (analz_image_freshK_ss addsimps [analz_image_freshK]) 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   297
qed "analz_insert_freshK";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   298
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   299
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   300
(*Everything that's hashed is already in past traffic. *)
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   301
goal thy "!!i. [| evs : recur lost;  A ~: lost |] ==>              \
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   302
\              Hash {|Key(shrK A), X|} : parts (sees lost Spy evs) -->  \
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   303
\              X : parts (sees lost Spy evs)";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   304
by (etac recur.induct 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   305
by parts_Fake_tac;
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   306
(*RA3 requires a further induction*)
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   307
by (etac responses.induct 5);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   308
by (ALLGOALS Asm_simp_tac);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   309
(*Fake*)
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   310
by (best_tac (!claset addDs [impOfSubs analz_subset_parts,
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   311
                             impOfSubs Fake_parts_insert]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   312
                      addss (!simpset addsimps [parts_insert_sees])) 2);
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   313
(*Two others*)
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   314
by (REPEAT (fast_tac (!claset addss (!simpset)) 1));
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   315
bind_thm ("Hash_imp_body", result() RSN (2, rev_mp));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   316
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   317
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   318
(** The Nonce NA uniquely identifies A's message. 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   319
    This theorem applies to steps RA1 and RA2!
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   320
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   321
  Unicity is not used in other proofs but is desirable in its own right.
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   322
**)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   323
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   324
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   325
 "!!evs. [| evs : recur lost; A ~: lost |]               \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   326
\ ==> EX B' P'. ALL B P.    \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   327
\        Hash {|Key(shrK A), Agent A, Agent B, Nonce NA, P|} \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   328
\          : parts (sees lost Spy evs)  -->  B=B' & P=P'";
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   329
by (parts_induct_tac 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   330
by (etac responses.induct 3);
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   331
by (ALLGOALS (simp_tac (!simpset addsimps [all_conj_distrib]))); 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   332
by (step_tac (!claset addSEs partsEs) 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   333
(*RA1,2: creation of new Nonce.  Move assertion into global context*)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   334
by (ALLGOALS (expand_case_tac "NA = ?y"));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   335
by (REPEAT_FIRST (ares_tac [exI]));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   336
by (REPEAT (best_tac (!claset addSDs [Hash_imp_body]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   337
                              addSEs sees_Spy_partsEs) 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   338
val lemma = result();
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   339
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   340
goalw thy [HPair_def]
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   341
 "!!evs.[| Hash[Key(shrK A)] {|Agent A, Agent B, Nonce NA, P|}   \
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   342
\            : parts (sees lost Spy evs);                          \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   343
\          Hash[Key(shrK A)] {|Agent A, Agent B', Nonce NA, P'|} \
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   344
\            : parts (sees lost Spy evs);                          \
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   345
\          evs : recur lost;  A ~: lost |]                         \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   346
\        ==> B=B' & P=P'";
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   347
by (REPEAT (eresolve_tac partsEs 1));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   348
by (prove_unique_tac lemma 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   349
qed "unique_NA";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   350
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   351
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   352
(*** Lemmas concerning the Server's response
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   353
      (relations "respond" and "responses") 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   354
***)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   355
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   356
goal thy
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   357
 "!!evs. [| RB : responses evs;  evs : recur lost |] \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   358
\ ==> (Key (shrK B) : analz (insert RB (sees lost Spy evs))) = (B:lost)";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   359
by (etac responses.induct 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   360
by (ALLGOALS
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   361
    (asm_simp_tac 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   362
     (analz_image_freshK_ss addsimps [Spy_analz_shrK,
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   363
                                      resp_analz_image_freshK])));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   364
qed "shrK_in_analz_respond";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   365
Addsimps [shrK_in_analz_respond];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   366
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   367
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   368
goal thy  
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   369
 "!!evs. [| RB : responses evs;                             \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   370
\           ALL K KK. KK <= Compl (range shrK) -->          \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   371
\                     (Key K : analz (Key``KK Un H)) =      \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   372
\                     (K : KK | Key K : analz H) |]         \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   373
\       ==> (Key K : analz (insert RB H)) --> \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   374
\           (Key K : parts{RB} | Key K : analz H)";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   375
by (etac responses.induct 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   376
by (ALLGOALS
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   377
    (asm_simp_tac 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   378
     (analz_image_freshK_ss addsimps [resp_analz_image_freshK_lemma])));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   379
(*Simplification using two distinct treatments of "image"*)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   380
by (simp_tac (!simpset addsimps [parts_insert2]) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   381
by (fast_tac (!claset delrules [allE]) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   382
qed "resp_analz_insert_lemma";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   383
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   384
bind_thm ("resp_analz_insert",
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   385
          raw_analz_image_freshK RSN
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   386
            (2, resp_analz_insert_lemma) RSN(2, rev_mp));
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   387
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   388
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   389
(*The Server does not send such messages.  This theorem lets us avoid
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   390
  assuming B~=Server in RA4.*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   391
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   392
 "!!evs. evs : recur lost       \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   393
\ ==> ALL C X Y P. Says Server C {|X, Agent Server, Agent C, Y, P|} \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   394
\                  ~: set_of_list evs";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   395
by (etac recur.induct 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   396
by (etac (respond.induct) 5);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   397
by (Auto_tac());
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   398
qed_spec_mp "Says_Server_not";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   399
AddSEs [Says_Server_not RSN (2,rev_notE)];
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   400
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   401
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   402
(*The last key returned by respond indeed appears in a certificate*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   403
goal thy 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   404
 "!!K. (Hash[Key(shrK A)] {|Agent A, B, NA, P|}, RA, K) : respond evs \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   405
\ ==> Crypt (shrK A) {|Key K, B, NA|} : parts {RA}";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   406
by (etac respond.elim 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   407
by (ALLGOALS Asm_full_simp_tac);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   408
qed "respond_certificate";
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   409
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   410
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   411
goal thy 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   412
 "!!K'. (PB,RB,KXY) : respond evs               \
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   413
\  ==> EX A' B'. ALL A B N.              \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   414
\        Crypt (shrK A) {|Key K, Agent B, N|} : parts {RB} \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   415
\          -->   (A'=A & B'=B) | (A'=B & B'=A)";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   416
by (etac respond.induct 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   417
by (ALLGOALS (asm_full_simp_tac (!simpset addsimps [all_conj_distrib]))); 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   418
(*Base case*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   419
by (Fast_tac 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   420
by (Step_tac 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   421
(*Case analysis on K=KBC*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   422
by (expand_case_tac "K = ?y" 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   423
by (dtac respond_Key_in_parts 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   424
by (best_tac (!claset addSIs [exI]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   425
                      addSEs partsEs
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   426
                      addDs [Key_in_parts_respond]) 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   427
(*Case analysis on K=KAB*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   428
by (expand_case_tac "K = ?y" 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   429
by (REPEAT (ares_tac [exI] 2));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   430
by (ex_strip_tac 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   431
by (dtac respond_certificate 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   432
by (Fast_tac 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   433
val lemma = result();
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   434
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   435
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   436
 "!!RB. [| Crypt (shrK A) {|Key K, Agent B, N|} : parts {RB};    \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   437
\          Crypt (shrK A') {|Key K, Agent B', N'|} : parts {RB};   \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   438
\          (PB,RB,KXY) : respond evs |]               \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   439
\ ==>   (A'=A & B'=B) | (A'=B & B'=A)";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   440
by (prove_unique_tac lemma 1);  (*50 seconds??, due to the disjunctions*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   441
qed "unique_session_keys";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   442
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   443
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   444
(** Crucial secrecy property: Spy does not see the keys sent in msg RA3
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   445
    Does not in itself guarantee security: an attack could violate 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   446
    the premises, e.g. by having A=Spy **)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   447
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   448
goal thy 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   449
 "!!evs. [| (PB,RB,KAB) : respond evs;  evs : recur lost |]       \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   450
\        ==> ALL A A' N. A ~: lost & A' ~: lost -->  \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   451
\            Crypt (shrK A) {|Key K, Agent A', N|} : parts{RB} -->  \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   452
\            Key K ~: analz (insert RB (sees lost Spy evs))";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   453
by (etac respond.induct 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   454
by (forward_tac [respond_imp_responses] 2);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   455
by (forward_tac [respond_imp_not_used] 2);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   456
by (ALLGOALS (*43 seconds*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   457
    (asm_simp_tac 
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   458
     (analz_image_freshK_ss addsimps 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   459
          [analz_image_freshK, not_parts_not_analz,
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   460
           shrK_in_analz_respond,
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   461
           read_instantiate [("H", "?ff``?xx")] parts_insert,
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   462
           resp_analz_image_freshK, analz_insert_freshK])));
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   463
by (ALLGOALS Simp_tac);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   464
by (fast_tac (!claset addIs [impOfSubs analz_subset_parts]) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   465
by (step_tac (!claset addSEs [MPair_parts]) 1);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   466
(** LEVEL 7 **)
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   467
by (fast_tac (!claset addSDs [resp_analz_insert, Key_in_parts_respond]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   468
                      addDs  [impOfSubs analz_subset_parts]) 4);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   469
by (fast_tac (!claset addSDs [respond_certificate]) 3);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   470
by (best_tac (!claset addSEs partsEs
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   471
                      addDs [Key_in_parts_respond]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   472
                      addss (!simpset)) 2);
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   473
by (dtac unique_session_keys 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   474
by (etac respond_certificate 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   475
by (assume_tac 1);
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   476
by (Fast_tac 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   477
qed_spec_mp "respond_Spy_not_see_encrypted_key";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   478
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   479
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   480
goal thy
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   481
 "!!evs. [| A ~: lost;  A' ~: lost;  evs : recur lost |]            \
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   482
\        ==> Says Server B RB : set_of_list evs -->                 \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   483
\            Crypt (shrK A) {|Key K, Agent A', N|} : parts{RB} -->  \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   484
\            Key K ~: analz (sees lost Spy evs)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   485
by (etac recur.induct 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   486
by analz_Fake_tac;
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   487
by (ALLGOALS
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   488
    (asm_simp_tac
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   489
     (!simpset addsimps [not_parts_not_analz, analz_insert_freshK] 
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   490
               setloop split_tac [expand_if])));
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   491
(*RA4*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   492
by (spy_analz_tac 4);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   493
(*Fake*)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   494
by (spy_analz_tac 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   495
by (step_tac (!claset delrules [impCE]) 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   496
(*RA2*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   497
by (spy_analz_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   498
(*RA3, case 2: K is an old key*)
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   499
by (best_tac (!claset addSDs [resp_analz_insert]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   500
                      addSEs partsEs
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   501
                      addDs [Key_in_parts_respond, 
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   502
                             Says_imp_sees_Spy RS parts.Inj RSN (2, parts_cut)]
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   503
                      addss (!simpset)) 2);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   504
(*RA3, case 1: use lemma previously proved by induction*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   505
by (fast_tac (!claset addSEs [respond_Spy_not_see_encrypted_key RSN
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   506
                              (2,rev_notE)]) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   507
bind_thm ("Spy_not_see_encrypted_key", result() RS mp RSN (2, rev_mp));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   508
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   509
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   510
goal thy 
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   511
 "!!evs. [| Says Server B RB : set_of_list evs;                 \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   512
\           Crypt (shrK A) {|Key K, Agent A', N|} : parts{RB};  \
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   513
\           C ~: {A,A',Server};                                 \
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   514
\           A ~: lost;  A' ~: lost;  evs : recur lost |]        \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   515
\        ==> Key K ~: analz (sees lost C evs)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   516
by (rtac (subset_insertI RS sees_mono RS analz_mono RS contra_subsetD) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   517
by (rtac (sees_lost_agent_subset_sees_Spy RS analz_mono RS contra_subsetD) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   518
by (FIRSTGOAL (rtac Spy_not_see_encrypted_key));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   519
by (REPEAT_FIRST (fast_tac (!claset addIs [recur_mono RS subsetD])));
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   520
qed "Agent_not_see_encrypted_key";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   521
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   522
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   523
(**** Authenticity properties for Agents ****)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   524
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   525
(*The response never contains Hashes*)
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   526
goal thy
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   527
 "!!evs. (PB,RB,K) : respond evs \
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   528
\        ==> Hash {|Key (shrK B), M|} : parts (insert RB H) --> \
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   529
\            Hash {|Key (shrK B), M|} : parts H";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   530
by (etac (respond_imp_responses RS responses.induct) 1);
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   531
by (Auto_tac());
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   532
bind_thm ("Hash_in_parts_respond", result() RSN (2, rev_mp));
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   533
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   534
(*Only RA1 or RA2 can have caused such a part of a message to appear.*)
2481
ee461c8bc9c3 Now uses HPair
paulson
parents: 2455
diff changeset
   535
goalw thy [HPair_def]
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   536
 "!!evs. [| Hash {|Key(shrK A), Agent A, Agent B, NA, P|}         \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   537
\             : parts (sees lost Spy evs);                        \
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   538
\            A ~: lost;  evs : recur lost |]                        \
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   539
\        ==> Says A B (Hash[Key(shrK A)] {|Agent A, Agent B, NA, P|})  \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   540
\             : set_of_list evs";
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   541
by (etac rev_mp 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   542
by (parts_induct_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   543
(*RA3*)
2485
c4368c967c56 Simplification of some proofs, especially by eliminating
paulson
parents: 2481
diff changeset
   544
by (fast_tac (!claset addSDs [Hash_in_parts_respond]) 1);
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   545
qed_spec_mp "Hash_auth_sender";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   546
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   547
2516
4d68fbe6378b Now with Andy Gordon's treatment of freshness to replace newN/K
paulson
parents: 2485
diff changeset
   548
(** These two results subsume (for all agents) the guarantees proved
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   549
    separately for A and B in the Otway-Rees protocol.
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   550
**)
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   551
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   552
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   553
(*Encrypted messages can only originate with the Server.*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   554
goal thy 
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   555
 "!!evs. [| A ~: lost;  A ~= Spy;  evs : recur lost |]       \
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   556
\    ==> Crypt (shrK A) Y : parts (sees lost Spy evs)        \
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   557
\        --> (EX C RC. Says Server C RC : set_of_list evs &  \
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   558
\                      Crypt (shrK A) Y : parts {RC})";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   559
by (parts_induct_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   560
(*RA4*)
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   561
by (Fast_tac 4);
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   562
(*RA3*)
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   563
by (full_simp_tac (!simpset addsimps [parts_insert_sees]) 3
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   564
    THEN Fast_tac 3);
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   565
(*RA1*)
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   566
by (Fast_tac 1);
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   567
(*RA2: it cannot be a new Nonce, contradiction.*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   568
by (deepen_tac (!claset delrules [impCE]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   569
                      addSIs [disjI2]
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   570
                      addSEs [MPair_parts]
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   571
                      addDs  [parts_cut, parts.Body]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   572
                      addss  (!simpset)) 0 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   573
qed_spec_mp "Crypt_imp_Server_msg";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   574
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   575
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   576
(*Corollary: if A receives B's message then the key came from the Server*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   577
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   578
 "!!evs. [| Says B' A RA : set_of_list evs;                        \
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   579
\           Crypt (shrK A) {|Key K, Agent A', NA|} : parts {RA};   \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   580
\           A ~: lost;  A ~= Spy;  evs : recur lost |]             \
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   581
\        ==> EX C RC. Says Server C RC : set_of_list evs &         \
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   582
\                       Crypt (shrK A) {|Key K, Agent A', NA|} : parts {RC}";
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   583
by (best_tac (!claset addSIs [Crypt_imp_Server_msg]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   584
                      addDs  [Says_imp_sees_Spy RS parts.Inj RSN (2,parts_cut)]
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   585
                      addss  (!simpset)) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   586
qed "Agent_trust";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   587
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   588
2455
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   589
(*Overall guarantee: if A receives a certificant mentioning A'
9c4444bfd44e Simplification and generalization of the guarantees.
paulson
parents: 2451
diff changeset
   590
  then the only other agent who knows the key is A'.*)
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   591
goal thy 
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   592
 "!!evs. [| Says B' A RA : set_of_list evs;                           \
2451
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   593
\           Crypt (shrK A) {|Key K, Agent A', NA|} : parts {RA};      \
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   594
\           C ~: {A,A',Server};                                       \
ce85a2aafc7a Extensive tidying and simplification, largely stemming from
paulson
parents: 2449
diff changeset
   595
\           A ~: lost;  A' ~: lost;  A ~= Spy;  evs : recur lost |]   \
2449
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   596
\        ==> Key K ~: analz (sees lost C evs)";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   597
by (dtac Agent_trust 1 THEN REPEAT_FIRST assume_tac);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   598
by (fast_tac (!claset addSEs [Agent_not_see_encrypted_key RSN(2,rev_notE)]) 1);
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   599
qed "Agent_secrecy";
d30ad12b1397 Recursive Authentication Protocol
paulson
parents:
diff changeset
   600