author | webertj |
Sun, 14 Nov 2004 01:40:27 +0100 | |
changeset 15283 | f21466450330 |
parent 14946 | 8aea9f96847f |
child 15582 | 7219facb3fd0 |
permissions | -rw-r--r-- |
15283 | 1 |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> |
2 |
||
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
3 |
<HTML><HEAD><TITLE>HOL/Auth/README</TITLE></HEAD><BODY> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
4 |
|
13508 | 5 |
<H1>Auth--The Inductive Approach to Verifying Security Protocols</H1> |
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
6 |
|
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
7 |
<P>Cryptographic protocols are of major importance, especially with the |
14004 | 8 |
growing use of the Internet. This directory demonstrates the ``inductive |
9 |
method'' of protocol verification, which is described in <A |
|
13508 | 10 |
HREF="http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html">various |
11 |
papers</A>. The operational semantics of protocol participants is defined |
|
14004 | 12 |
inductively. |
13508 | 13 |
|
14 |
<P>This directory contains proofs concerning |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
15 |
|
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
16 |
<UL> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
17 |
<LI>three versions of the Otway-Rees protocol |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
18 |
|
14004 | 19 |
<LI>the Needham-Schroeder shared-key protocol |
20 |
||
21 |
<LI>the Needham-Schroeder public-key protocol (original and with Lowe's |
|
22 |
modification) |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
23 |
|
6452 | 24 |
<LI>two versions of Kerberos: the simplified form published in the BAN paper |
25 |
and also the full protocol (Kerberos IV) |
|
6400 | 26 |
|
27 |
<LI>three versions of the Yahalom protocol, including a bad one that |
|
28 |
illustrates the purpose of the Oops rule |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
29 |
|
4594 | 30 |
<LI>a novel recursive authentication protocol |
31 |
||
32 |
<LI>the Internet protocol TLS |
|
14004 | 33 |
|
34 |
<LI>The certified e-mail protocol of Abadi et al. |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
35 |
</UL> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
36 |
|
14946 | 37 |
<P>Frederic Blanqui has contributed a theory of guardedness, which is |
38 |
demonstrated by proofs of some roving agent protocols. |
|
14004 | 39 |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
40 |
<HR> |
14004 | 41 |
<P>Last modified $Date$ |
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
42 |
|
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
43 |
<ADDRESS> |
13508 | 44 |
<A |
45 |
HREF="http://www.cl.cam.ac.uk/users/lcp/">Larry Paulson</A>, |
|
46 |
<A HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A> |
|
3119
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
47 |
</ADDRESS> |
bb2ee88aa43f
Description of the Auth directory: security protocols proofs
paulson
parents:
diff
changeset
|
48 |
</BODY></HTML> |