| author | wenzelm | 
| Sun, 28 Jul 2019 14:28:40 +0200 | |
| changeset 70430 | 6ec97dc6670e | 
| parent 51404 | 90a598019aeb | 
| permissions | -rw-r--r-- | 
| 15283 | 1 | <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> | 
| 2 | ||
| 15582 | 3 | <HTML> | 
| 4 | ||
| 5 | <HEAD> | |
| 6 | <meta http-equiv="content-type" content="text/html;charset=iso-8859-1"> | |
| 7 | <TITLE>HOL/Auth/README</TITLE> | |
| 8 | </HEAD> | |
| 9 | ||
| 10 | <BODY> | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 11 | |
| 13508 | 12 | <H1>Auth--The Inductive Approach to Verifying Security Protocols</H1> | 
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 13 | |
| 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 14 | <P>Cryptographic protocols are of major importance, especially with the | 
| 14004 | 15 | growing use of the Internet. This directory demonstrates the ``inductive | 
| 16 | method'' of protocol verification, which is described in <A | |
| 13508 | 17 | HREF="http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html">various | 
| 18 | papers</A>. The operational semantics of protocol participants is defined | |
| 14004 | 19 | inductively. | 
| 13508 | 20 | |
| 21 | <P>This directory contains proofs concerning | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 22 | |
| 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 23 | <UL> | 
| 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 24 | <LI>three versions of the Otway-Rees protocol | 
| 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 25 | |
| 14004 | 26 | <LI>the Needham-Schroeder shared-key protocol | 
| 27 | ||
| 28 | <LI>the Needham-Schroeder public-key protocol (original and with Lowe's | |
| 29 | modification) | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 30 | |
| 6452 | 31 | <LI>two versions of Kerberos: the simplified form published in the BAN paper | 
| 32 | and also the full protocol (Kerberos IV) | |
| 6400 | 33 | |
| 34 | <LI>three versions of the Yahalom protocol, including a bad one that | |
| 35 | illustrates the purpose of the Oops rule | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 36 | |
| 4594 | 37 | <LI>a novel recursive authentication protocol | 
| 38 | ||
| 39 | <LI>the Internet protocol TLS | |
| 14004 | 40 | |
| 41 | <LI>The certified e-mail protocol of Abadi et al. | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 42 | </UL> | 
| 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 43 | |
| 14946 | 44 | <P>Frederic Blanqui has contributed a theory of guardedness, which is | 
| 45 | demonstrated by proofs of some roving agent protocols. | |
| 14004 | 46 | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 47 | <ADDRESS> | 
| 13508 | 48 | <A | 
| 49 | HREF="http://www.cl.cam.ac.uk/users/lcp/">Larry Paulson</A>, | |
| 50 | <A HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A> | |
| 3119 
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
 paulson parents: diff
changeset | 51 | </ADDRESS> | 
| 15582 | 52 | </BODY> | 
| 53 | </HTML> |