author | blanchet |
Fri, 21 Feb 2014 00:09:56 +0100 | |
changeset 55642 | 63beb38e9258 |
parent 51404 | 90a598019aeb |
permissions | -rw-r--r-- |
15283 | 1 |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> |
2 |
||
15582 | 3 |
<HTML> |
4 |
||
5 |
<HEAD> |
|
6 |
<meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> |
|
7 |
<TITLE>HOL/Auth/README</TITLE> |
|
8 |
</HEAD> |
|
9 |
||
10 |
<BODY> |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
11 |
|
13508 | 12 |
<H1>Auth--The Inductive Approach to Verifying Security Protocols</H1> |
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
13 |
|
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
14 |
<P>Cryptographic protocols are of major importance, especially with the |
14004 | 15 |
growing use of the Internet. This directory demonstrates the ``inductive |
16 |
method'' of protocol verification, which is described in <A |
|
13508 | 17 |
HREF="http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html">various |
18 |
papers</A>. The operational semantics of protocol participants is defined |
|
14004 | 19 |
inductively. |
13508 | 20 |
|
21 |
<P>This directory contains proofs concerning |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
22 |
|
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
23 |
<UL> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
24 |
<LI>three versions of the Otway-Rees protocol |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
25 |
|
14004 | 26 |
<LI>the Needham-Schroeder shared-key protocol |
27 |
||
28 |
<LI>the Needham-Schroeder public-key protocol (original and with Lowe's |
|
29 |
modification) |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
30 |
|
6452 | 31 |
<LI>two versions of Kerberos: the simplified form published in the BAN paper |
32 |
and also the full protocol (Kerberos IV) |
|
6400 | 33 |
|
34 |
<LI>three versions of the Yahalom protocol, including a bad one that |
|
35 |
illustrates the purpose of the Oops rule |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
36 |
|
4594 | 37 |
<LI>a novel recursive authentication protocol |
38 |
||
39 |
<LI>the Internet protocol TLS |
|
14004 | 40 |
|
41 |
<LI>The certified e-mail protocol of Abadi et al. |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
42 |
</UL> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
43 |
|
14946 | 44 |
<P>Frederic Blanqui has contributed a theory of guardedness, which is |
45 |
demonstrated by proofs of some roving agent protocols. |
|
14004 | 46 |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
47 |
<ADDRESS> |
13508 | 48 |
<A |
49 |
HREF="http://www.cl.cam.ac.uk/users/lcp/">Larry Paulson</A>, |
|
50 |
<A HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A> |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
51 |
</ADDRESS> |
15582 | 52 |
</BODY> |
53 |
</HTML> |