| 
15283
 | 
     1  | 
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
  | 
| 
 | 
     2  | 
  | 
| 
13508
 | 
     3  | 
<!-- $Id$ -->
  | 
| 
15582
 | 
     4  | 
  | 
| 
 | 
     5  | 
<HTML>
  | 
| 
 | 
     6  | 
  | 
| 
 | 
     7  | 
<HEAD>
  | 
| 
 | 
     8  | 
  <meta http-equiv="content-type" content="text/html;charset=iso-8859-1">
  | 
| 
 | 
     9  | 
  <TITLE>HOL/Auth/Guard/README.html</TITLE>
  | 
| 
 | 
    10  | 
</HEAD>
  | 
| 
 | 
    11  | 
  | 
| 
 | 
    12  | 
<BODY>
  | 
| 
13508
 | 
    13  | 
  | 
| 
 | 
    14  | 
<H1>Protocol-Independent Secrecy Results</H1>
  | 
| 
 | 
    15  | 
  | 
| 
 | 
    16  | 
date: april 2002
  | 
| 
 | 
    17  | 
author: Frederic Blanqui
  | 
| 
 | 
    18  | 
email: blanqui@lri.fr
  | 
| 
 | 
    19  | 
webpage: 
  | 
| 
 | 
    20  | 
  | 
| 
 | 
    21  | 
<P>The current development is built above the HOL (Higher-Order Logic)
  | 
| 
 | 
    22  | 
Isabelle theory and the formalization of protocols introduced by <A
  | 
| 
 | 
    23  | 
HREF="http://www.cl.cam.ac.uk/users/lcp/">Larry Paulson</A>.  More details are
  | 
| 
 | 
    24  | 
in his paper <A
  | 
| 
 | 
    25  | 
HREF="http://www.cl.cam.ac.uk/users/lcp/papers/Auth/jcs.pdf">
  | 
| 
 | 
    26  | 
The Inductive approach
  | 
| 
 | 
    27  | 
to verifying cryptographic protocols</A> (J. Computer Security 6, pages
  | 
| 
 | 
    28  | 
85-128, 1998).
  | 
| 
 | 
    29  | 
  | 
| 
 | 
    30  | 
<P>
  | 
| 
 | 
    31  | 
This directory contains a number of files:
  | 
| 
 | 
    32  | 
  | 
| 
 | 
    33  | 
<UL>
  | 
| 
 | 
    34  | 
<LI>Extensions.thy contains extensions of Larry Paulson's files with many useful
  | 
| 
 | 
    35  | 
lemmas.
  | 
| 
 | 
    36  | 
  | 
| 
 | 
    37  | 
<LI>Analz contains an important theorem about the decomposition of analz
  | 
| 
 | 
    38  | 
between pparts (pairs) and kparts (messages that are not pairs).
  | 
| 
 | 
    39  | 
  | 
| 
 | 
    40  | 
<LI>Guard contains the protocol-independent secrecy theorem for nonces.
  | 
| 
 | 
    41  | 
<LI>GuardK is the same for keys.
  | 
| 
 | 
    42  | 
<LI>Guard_Public extends Guard and GuardK for public-key protocols.
  | 
| 
 | 
    43  | 
<LI>Guard_Shared extends Guard and GuardK for symmetric-key protocols.
  | 
| 
 | 
    44  | 
  | 
| 
 | 
    45  | 
<LI>List_Msg contains definitions on lists (inside messages).
  | 
| 
 | 
    46  | 
  | 
| 
 | 
    47  | 
<LI>P1 contains the definition of the protocol P1 and the proof of its
  | 
| 
 | 
    48  | 
properties (strong forward integrity, insertion resilience, truncation
  | 
| 
 | 
    49  | 
resilience, data confidentiality and non-repudiability)
  | 
| 
 | 
    50  | 
  | 
| 
 | 
    51  | 
<LI>P2 is the same for the protocol P2
  | 
| 
 | 
    52  | 
  | 
| 
 | 
    53  | 
<LI>NS_Public is for Needham-Schroeder-Lowe
  | 
| 
 | 
    54  | 
<LI>OtwayRees is for Otway-Rees
  | 
| 
 | 
    55  | 
<LI>Yahalom is for Yahalom
  | 
| 
 | 
    56  | 
  | 
| 
 | 
    57  | 
<LI>Proto contains a more precise formalization of protocols with rules
  | 
| 
 | 
    58  | 
and a protocol-independent theorem for proving guardness from a preservation
  | 
| 
 | 
    59  | 
property. It also contains the proofs for Needham-Schroeder as an example.
  | 
| 
 | 
    60  | 
</UL>
  | 
| 
 | 
    61  | 
  | 
| 
 | 
    62  | 
<HR>
  | 
| 
 | 
    63  | 
<P>Last modified 20 August 2002
  | 
| 
 | 
    64  | 
  | 
| 
 | 
    65  | 
<ADDRESS>
  | 
| 
 | 
    66  | 
<A HREF="http://www.lri.fr/~blanqui/">Frederic Blanqui</A>,
  | 
| 
 | 
    67  | 
<A HREF="mailto:blanqui@lri.fr">blanqui@lri.fr</A>
  | 
| 
 | 
    68  | 
</ADDRESS>
  | 
| 
15582
 | 
    69  | 
</BODY>
  | 
| 
 | 
    70  | 
</HTML>
  |