| author | haftmann | 
| Wed, 14 Jul 2010 17:16:02 +0200 | |
| changeset 37832 | f8fcfc678280 | 
| parent 36866 | 426d5781bb25 | 
| child 37936 | 1e4c5015a72e | 
| permissions | -rw-r--r-- | 
| 18886 | 1 | (* ID: $Id$ | 
| 2 | Author: Giampaolo Bella, Catania University | |
| 3 | *) | |
| 4 | ||
| 5 | header{*The Kerberos Protocol, Version V*}
 | |
| 6 | ||
| 7 | theory KerberosV imports Public begin | |
| 8 | ||
| 9 | text{*The "u" prefix indicates theorems referring to an updated version of the protocol. The "r" suffix indicates theorems where the confidentiality assumptions are relaxed by the corresponding arguments.*}
 | |
| 10 | ||
| 20768 | 11 | abbreviation | 
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 12 | Kas :: agent where | 
| 20768 | 13 | "Kas == Server" | 
| 18886 | 14 | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 15 | abbreviation | 
| 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 16 | Tgs :: agent where | 
| 20768 | 17 | "Tgs == Friend 0" | 
| 18886 | 18 | |
| 19 | ||
| 20 | axioms | |
| 21 | Tgs_not_bad [iff]: "Tgs \<notin> bad" | |
| 22 |    --{*Tgs is secure --- we already know that Kas is secure*}
 | |
| 23 | ||
| 36866 | 24 | definition | 
| 18886 | 25 | (* authKeys are those contained in an authTicket *) | 
| 36866 | 26 | authKeys :: "event list => key set" where | 
| 27 |     "authKeys evs = {authK. \<exists>A Peer Ta. 
 | |
| 18886 | 28 | Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Peer, Ta\<rbrace>, | 
| 29 | Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key authK, Ta\<rbrace> | |
| 30 | \<rbrace> \<in> set evs}" | |
| 31 | ||
| 36866 | 32 | definition | 
| 18886 | 33 | (* A is the true creator of X if she has sent X and X never appeared on | 
| 34 | the trace before this event. Recall that traces grow from head. *) | |
| 35 | Issues :: "[agent, agent, msg, event list] => bool" | |
| 36866 | 36 |              ("_ Issues _ with _ on _") where
 | 
| 37 | "A Issues B with X on evs = | |
| 38 |       (\<exists>Y. Says A B Y \<in> set evs \<and> X \<in> parts {Y} \<and>
 | |
| 39 | X \<notin> parts (spies (takeWhile (% z. z \<noteq> Says A B Y) (rev evs))))" | |
| 18886 | 40 | |
| 41 | ||
| 42 | consts | |
| 43 | (*Duration of the authentication key*) | |
| 44 | authKlife :: nat | |
| 45 | ||
| 46 | (*Duration of the service key*) | |
| 47 | servKlife :: nat | |
| 48 | ||
| 49 | (*Duration of an authenticator*) | |
| 50 | authlife :: nat | |
| 51 | ||
| 52 | (*Upper bound on the time of reaction of a server*) | |
| 53 | replylife :: nat | |
| 54 | ||
| 55 | specification (authKlife) | |
| 56 | authKlife_LB [iff]: "2 \<le> authKlife" | |
| 57 | by blast | |
| 58 | ||
| 59 | specification (servKlife) | |
| 60 | servKlife_LB [iff]: "2 + authKlife \<le> servKlife" | |
| 61 | by blast | |
| 62 | ||
| 63 | specification (authlife) | |
| 64 | authlife_LB [iff]: "Suc 0 \<le> authlife" | |
| 65 | by blast | |
| 66 | ||
| 67 | specification (replylife) | |
| 68 | replylife_LB [iff]: "Suc 0 \<le> replylife" | |
| 69 | by blast | |
| 70 | ||
| 20768 | 71 | abbreviation | 
| 72 | (*The current time is just the length of the trace!*) | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 73 | CT :: "event list=>nat" where | 
| 20768 | 74 | "CT == length" | 
| 18886 | 75 | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 76 | abbreviation | 
| 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 77 | expiredAK :: "[nat, event list] => bool" where | 
| 20768 | 78 | "expiredAK T evs == authKlife + T < CT evs" | 
| 18886 | 79 | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 80 | abbreviation | 
| 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 81 | expiredSK :: "[nat, event list] => bool" where | 
| 20768 | 82 | "expiredSK T evs == servKlife + T < CT evs" | 
| 18886 | 83 | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 84 | abbreviation | 
| 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 85 | expiredA :: "[nat, event list] => bool" where | 
| 20768 | 86 | "expiredA T evs == authlife + T < CT evs" | 
| 18886 | 87 | |
| 21404 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 88 | abbreviation | 
| 
eb85850d3eb7
more robust syntax for definition/abbreviation/notation;
 wenzelm parents: 
20768diff
changeset | 89 |   valid :: "[nat, nat] => bool"  ("valid _ wrt _") where
 | 
| 20768 | 90 | "valid T1 wrt T2 == T1 <= replylife + T2" | 
| 18886 | 91 | |
| 92 | (*---------------------------------------------------------------------*) | |
| 93 | ||
| 94 | ||
| 95 | (* Predicate formalising the association between authKeys and servKeys *) | |
| 35416 
d8d7d1b785af
replaced a couple of constsdefs by definitions (also some old primrecs by modern ones)
 haftmann parents: 
32960diff
changeset | 96 | definition AKcryptSK :: "[key, key, event list] => bool" where | 
| 18886 | 97 | "AKcryptSK authK servK evs == | 
| 98 | \<exists>A B tt. | |
| 99 | Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, tt\<rbrace>, | |
| 100 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, tt\<rbrace> \<rbrace> | |
| 101 | \<in> set evs" | |
| 102 | ||
| 23746 | 103 | inductive_set kerbV :: "event list set" | 
| 104 | where | |
| 18886 | 105 | |
| 106 | Nil: "[] \<in> kerbV" | |
| 107 | ||
| 23746 | 108 | | Fake: "\<lbrakk> evsf \<in> kerbV; X \<in> synth (analz (spies evsf)) \<rbrakk> | 
| 18886 | 109 | \<Longrightarrow> Says Spy B X # evsf \<in> kerbV" | 
| 110 | ||
| 111 | ||
| 112 | (*Authentication phase*) | |
| 23746 | 113 | | KV1: "\<lbrakk> evs1 \<in> kerbV \<rbrakk> | 
| 18886 | 114 | \<Longrightarrow> Says A Kas \<lbrace>Agent A, Agent Tgs, Number (CT evs1)\<rbrace> # evs1 | 
| 115 | \<in> kerbV" | |
| 116 | (*Unlike version IV, authTicket is not re-encrypted*) | |
| 23746 | 117 | | KV2: "\<lbrakk> evs2 \<in> kerbV; Key authK \<notin> used evs2; authK \<in> symKeys; | 
| 18886 | 118 | Says A' Kas \<lbrace>Agent A, Agent Tgs, Number T1\<rbrace> \<in> set evs2 \<rbrakk> | 
| 119 | \<Longrightarrow> Says Kas A \<lbrace> | |
| 120 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number (CT evs2)\<rbrace>, | |
| 121 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number (CT evs2)\<rbrace> | |
| 122 | \<rbrace> # evs2 \<in> kerbV" | |
| 123 | ||
| 124 | ||
| 125 | (* Authorisation phase *) | |
| 23746 | 126 | | KV3: "\<lbrakk> evs3 \<in> kerbV; A \<noteq> Kas; A \<noteq> Tgs; | 
| 18886 | 127 | Says A Kas \<lbrace>Agent A, Agent Tgs, Number T1\<rbrace> \<in> set evs3; | 
| 128 | Says Kas' A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 129 | authTicket\<rbrace> \<in> set evs3; | |
| 130 | valid Ta wrt T1 | |
| 131 | \<rbrakk> | |
| 132 | \<Longrightarrow> Says A Tgs \<lbrace>authTicket, | |
| 133 | (Crypt authK \<lbrace>Agent A, Number (CT evs3)\<rbrace>), | |
| 134 | Agent B\<rbrace> # evs3 \<in> kerbV" | |
| 135 | (*Unlike version IV, servTicket is not re-encrypted*) | |
| 23746 | 136 | | KV4: "\<lbrakk> evs4 \<in> kerbV; Key servK \<notin> used evs4; servK \<in> symKeys; | 
| 18886 | 137 | B \<noteq> Tgs; authK \<in> symKeys; | 
| 138 | Says A' Tgs \<lbrace> | |
| 139 | (Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, | |
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 140 | Number Ta\<rbrace>), | 
| 18886 | 141 | (Crypt authK \<lbrace>Agent A, Number T2\<rbrace>), Agent B\<rbrace> | 
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 142 | \<in> set evs4; | 
| 18886 | 143 | \<not> expiredAK Ta evs4; | 
| 144 | \<not> expiredA T2 evs4; | |
| 145 | servKlife + (CT evs4) <= authKlife + Ta | |
| 146 | \<rbrakk> | |
| 147 | \<Longrightarrow> Says Tgs A \<lbrace> | |
| 148 | Crypt authK \<lbrace>Key servK, Agent B, Number (CT evs4)\<rbrace>, | |
| 149 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number (CT evs4)\<rbrace> | |
| 150 | \<rbrace> # evs4 \<in> kerbV" | |
| 151 | ||
| 152 | ||
| 153 | (*Service phase*) | |
| 23746 | 154 | | KV5: "\<lbrakk> evs5 \<in> kerbV; authK \<in> symKeys; servK \<in> symKeys; | 
| 18886 | 155 | A \<noteq> Kas; A \<noteq> Tgs; | 
| 156 | Says A Tgs | |
| 157 | \<lbrace>authTicket, Crypt authK \<lbrace>Agent A, Number T2\<rbrace>, | |
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 158 | Agent B\<rbrace> | 
| 18886 | 159 | \<in> set evs5; | 
| 160 | Says Tgs' A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 161 | servTicket\<rbrace> | |
| 162 | \<in> set evs5; | |
| 163 | valid Ts wrt T2 \<rbrakk> | |
| 164 | \<Longrightarrow> Says A B \<lbrace>servTicket, | |
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 165 | Crypt servK \<lbrace>Agent A, Number (CT evs5)\<rbrace> \<rbrace> | 
| 18886 | 166 | # evs5 \<in> kerbV" | 
| 167 | ||
| 23746 | 168 | | KV6: "\<lbrakk> evs6 \<in> kerbV; B \<noteq> Kas; B \<noteq> Tgs; | 
| 18886 | 169 | Says A' B \<lbrace> | 
| 170 | (Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>), | |
| 171 | (Crypt servK \<lbrace>Agent A, Number T3\<rbrace>)\<rbrace> | |
| 172 | \<in> set evs6; | |
| 173 | \<not> expiredSK Ts evs6; | |
| 174 | \<not> expiredA T3 evs6 | |
| 175 | \<rbrakk> | |
| 176 | \<Longrightarrow> Says B A (Crypt servK (Number Ta2)) | |
| 177 | # evs6 \<in> kerbV" | |
| 178 | ||
| 179 | ||
| 180 | ||
| 181 | (* Leaking an authK... *) | |
| 23746 | 182 | | Oops1:"\<lbrakk> evsO1 \<in> kerbV; A \<noteq> Spy; | 
| 18886 | 183 | Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | 
| 184 | authTicket\<rbrace> \<in> set evsO1; | |
| 185 | expiredAK Ta evsO1 \<rbrakk> | |
| 186 | \<Longrightarrow> Notes Spy \<lbrace>Agent A, Agent Tgs, Number Ta, Key authK\<rbrace> | |
| 187 | # evsO1 \<in> kerbV" | |
| 188 | ||
| 189 | (*Leaking a servK... *) | |
| 23746 | 190 | | Oops2: "\<lbrakk> evsO2 \<in> kerbV; A \<noteq> Spy; | 
| 18886 | 191 | Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | 
| 192 | servTicket\<rbrace> \<in> set evsO2; | |
| 193 | expiredSK Ts evsO2 \<rbrakk> | |
| 194 | \<Longrightarrow> Notes Spy \<lbrace>Agent A, Agent B, Number Ts, Key servK\<rbrace> | |
| 195 | # evsO2 \<in> kerbV" | |
| 196 | ||
| 197 | ||
| 198 | ||
| 199 | declare Says_imp_knows_Spy [THEN parts.Inj, dest] | |
| 200 | declare parts.Body [dest] | |
| 201 | declare analz_into_parts [dest] | |
| 202 | declare Fake_parts_insert_in_Un [dest] | |
| 203 | ||
| 204 | ||
| 205 | ||
| 206 | subsection{*Lemmas about lists, for reasoning about  Issues*}
 | |
| 207 | ||
| 208 | lemma spies_Says_rev: "spies (evs @ [Says A B X]) = insert X (spies evs)" | |
| 209 | apply (induct_tac "evs") | |
| 210 | apply (induct_tac [2] "a", auto) | |
| 211 | done | |
| 212 | ||
| 213 | lemma spies_Gets_rev: "spies (evs @ [Gets A X]) = spies evs" | |
| 214 | apply (induct_tac "evs") | |
| 215 | apply (induct_tac [2] "a", auto) | |
| 216 | done | |
| 217 | ||
| 218 | lemma spies_Notes_rev: "spies (evs @ [Notes A X]) = | |
| 219 | (if A:bad then insert X (spies evs) else spies evs)" | |
| 220 | apply (induct_tac "evs") | |
| 221 | apply (induct_tac [2] "a", auto) | |
| 222 | done | |
| 223 | ||
| 224 | lemma spies_evs_rev: "spies evs = spies (rev evs)" | |
| 225 | apply (induct_tac "evs") | |
| 226 | apply (induct_tac [2] "a") | |
| 227 | apply (simp_all (no_asm_simp) add: spies_Says_rev spies_Gets_rev spies_Notes_rev) | |
| 228 | done | |
| 229 | ||
| 230 | lemmas parts_spies_evs_revD2 = spies_evs_rev [THEN equalityD2, THEN parts_mono] | |
| 231 | ||
| 232 | lemma spies_takeWhile: "spies (takeWhile P evs) <= spies evs" | |
| 233 | apply (induct_tac "evs") | |
| 234 | apply (induct_tac [2] "a", auto) | |
| 235 | txt{* Resembles @{text"used_subset_append"} in theory Event.*}
 | |
| 236 | done | |
| 237 | ||
| 238 | lemmas parts_spies_takeWhile_mono = spies_takeWhile [THEN parts_mono] | |
| 239 | ||
| 240 | ||
| 241 | subsection{*Lemmas about @{term authKeys}*}
 | |
| 242 | ||
| 243 | lemma authKeys_empty: "authKeys [] = {}"
 | |
| 244 | apply (unfold authKeys_def) | |
| 245 | apply (simp (no_asm)) | |
| 246 | done | |
| 247 | ||
| 248 | lemma authKeys_not_insert: | |
| 249 | "(\<forall>A Ta akey Peer. | |
| 250 | ev \<noteq> Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>akey, Agent Peer, Ta\<rbrace>, | |
| 251 | Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, akey, Ta\<rbrace> \<rbrace>) | |
| 252 | \<Longrightarrow> authKeys (ev # evs) = authKeys evs" | |
| 253 | apply (unfold authKeys_def, auto) | |
| 254 | done | |
| 255 | ||
| 256 | lemma authKeys_insert: | |
| 257 | "authKeys | |
| 258 | (Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key K, Agent Peer, Number Ta\<rbrace>, | |
| 259 | Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key K, Number Ta\<rbrace> \<rbrace> # evs) | |
| 260 | = insert K (authKeys evs)" | |
| 261 | apply (unfold authKeys_def, auto) | |
| 262 | done | |
| 263 | ||
| 264 | lemma authKeys_simp: | |
| 265 | "K \<in> authKeys | |
| 266 | (Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key K', Agent Peer, Number Ta\<rbrace>, | |
| 267 | Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key K', Number Ta\<rbrace> \<rbrace> # evs) | |
| 268 | \<Longrightarrow> K = K' | K \<in> authKeys evs" | |
| 269 | apply (unfold authKeys_def, auto) | |
| 270 | done | |
| 271 | ||
| 272 | lemma authKeysI: | |
| 273 | "Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key K, Agent Tgs, Number Ta\<rbrace>, | |
| 274 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key K, Number Ta\<rbrace> \<rbrace> \<in> set evs | |
| 275 | \<Longrightarrow> K \<in> authKeys evs" | |
| 276 | apply (unfold authKeys_def, auto) | |
| 277 | done | |
| 278 | ||
| 279 | lemma authKeys_used: "K \<in> authKeys evs \<Longrightarrow> Key K \<in> used evs" | |
| 280 | apply (simp add: authKeys_def, blast) | |
| 281 | done | |
| 282 | ||
| 283 | ||
| 284 | subsection{*Forwarding Lemmas*}
 | |
| 285 | ||
| 286 | lemma Says_ticket_parts: | |
| 287 | "Says S A \<lbrace>Crypt K \<lbrace>SesKey, B, TimeStamp\<rbrace>, Ticket\<rbrace> | |
| 288 | \<in> set evs \<Longrightarrow> Ticket \<in> parts (spies evs)" | |
| 289 | apply blast | |
| 290 | done | |
| 291 | ||
| 292 | lemma Says_ticket_analz: | |
| 293 | "Says S A \<lbrace>Crypt K \<lbrace>SesKey, B, TimeStamp\<rbrace>, Ticket\<rbrace> | |
| 294 | \<in> set evs \<Longrightarrow> Ticket \<in> analz (spies evs)" | |
| 295 | apply (blast dest: Says_imp_knows_Spy [THEN analz.Inj, THEN analz.Snd]) | |
| 296 | done | |
| 297 | ||
| 298 | lemma Oops_range_spies1: | |
| 299 | "\<lbrakk> Says Kas A \<lbrace>Crypt KeyA \<lbrace>Key authK, Peer, Ta\<rbrace>, authTicket\<rbrace> | |
| 300 | \<in> set evs ; | |
| 301 | evs \<in> kerbV \<rbrakk> \<Longrightarrow> authK \<notin> range shrK & authK \<in> symKeys" | |
| 302 | apply (erule rev_mp) | |
| 303 | apply (erule kerbV.induct, auto) | |
| 304 | done | |
| 305 | ||
| 306 | lemma Oops_range_spies2: | |
| 307 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, servTicket\<rbrace> | |
| 308 | \<in> set evs ; | |
| 309 | evs \<in> kerbV \<rbrakk> \<Longrightarrow> servK \<notin> range shrK \<and> servK \<in> symKeys" | |
| 310 | apply (erule rev_mp) | |
| 311 | apply (erule kerbV.induct, auto) | |
| 312 | done | |
| 313 | ||
| 314 | ||
| 315 | (*Spy never sees another agent's shared key! (unless it's lost at start)*) | |
| 316 | lemma Spy_see_shrK [simp]: | |
| 317 | "evs \<in> kerbV \<Longrightarrow> (Key (shrK A) \<in> parts (spies evs)) = (A \<in> bad)" | |
| 318 | apply (erule kerbV.induct) | |
| 319 | apply (frule_tac [7] Says_ticket_parts) | |
| 320 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 321 | apply (blast+) | |
| 322 | done | |
| 323 | ||
| 324 | lemma Spy_analz_shrK [simp]: | |
| 325 | "evs \<in> kerbV \<Longrightarrow> (Key (shrK A) \<in> analz (spies evs)) = (A \<in> bad)" | |
| 326 | by auto | |
| 327 | ||
| 328 | lemma Spy_see_shrK_D [dest!]: | |
| 329 | "\<lbrakk> Key (shrK A) \<in> parts (spies evs); evs \<in> kerbV \<rbrakk> \<Longrightarrow> A:bad" | |
| 330 | by (blast dest: Spy_see_shrK) | |
| 331 | lemmas Spy_analz_shrK_D = analz_subset_parts [THEN subsetD, THEN Spy_see_shrK_D, dest!] | |
| 332 | ||
| 333 | text{*Nobody can have used non-existent keys!*}
 | |
| 334 | lemma new_keys_not_used [simp]: | |
| 335 | "\<lbrakk>Key K \<notin> used evs; K \<in> symKeys; evs \<in> kerbV\<rbrakk> | |
| 336 | \<Longrightarrow> K \<notin> keysFor (parts (spies evs))" | |
| 337 | apply (erule rev_mp) | |
| 338 | apply (erule kerbV.induct) | |
| 339 | apply (frule_tac [7] Says_ticket_parts) | |
| 340 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 341 | txt{*Fake*}
 | |
| 342 | apply (force dest!: keysFor_parts_insert) | |
| 343 | txt{*Others*}
 | |
| 344 | apply (force dest!: analz_shrK_Decrypt)+ | |
| 345 | done | |
| 346 | ||
| 347 | (*Earlier, all protocol proofs declared this theorem. | |
| 348 | But few of them actually need it! (Another is Yahalom) *) | |
| 349 | lemma new_keys_not_analzd: | |
| 350 | "\<lbrakk>evs \<in> kerbV; K \<in> symKeys; Key K \<notin> used evs\<rbrakk> | |
| 351 | \<Longrightarrow> K \<notin> keysFor (analz (spies evs))" | |
| 352 | by (blast dest: new_keys_not_used intro: keysFor_mono [THEN subsetD]) | |
| 353 | ||
| 354 | ||
| 355 | ||
| 356 | subsection{*Regularity Lemmas*}
 | |
| 357 | text{*These concern the form of items passed in messages*}
 | |
| 358 | ||
| 359 | text{*Describes the form of all components sent by Kas*}
 | |
| 360 | lemma Says_Kas_message_form: | |
| 361 | "\<lbrakk> Says Kas A \<lbrace>Crypt K \<lbrace>Key authK, Agent Peer, Ta\<rbrace>, authTicket\<rbrace> | |
| 362 | \<in> set evs; | |
| 363 | evs \<in> kerbV \<rbrakk> | |
| 364 | \<Longrightarrow> authK \<notin> range shrK \<and> authK \<in> authKeys evs \<and> authK \<in> symKeys \<and> | |
| 365 | authTicket = (Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Ta\<rbrace>) \<and> | |
| 366 | K = shrK A \<and> Peer = Tgs" | |
| 367 | apply (erule rev_mp) | |
| 368 | apply (erule kerbV.induct) | |
| 369 | apply (simp_all (no_asm) add: authKeys_def authKeys_insert) | |
| 370 | apply blast+ | |
| 371 | done | |
| 372 | ||
| 373 | ||
| 374 | ||
| 375 | (*This lemma is essential for proving Says_Tgs_message_form: | |
| 376 | ||
| 377 | the session key authK | |
| 378 | supplied by Kas in the authentication ticket | |
| 379 | cannot be a long-term key! | |
| 380 | ||
| 381 | Generalised to any session keys (both authK and servK). | |
| 382 | *) | |
| 383 | lemma SesKey_is_session_key: | |
| 384 | "\<lbrakk> Crypt (shrK Tgs_B) \<lbrace>Agent A, Agent Tgs_B, Key SesKey, Number T\<rbrace> | |
| 385 | \<in> parts (spies evs); Tgs_B \<notin> bad; | |
| 386 | evs \<in> kerbV \<rbrakk> | |
| 387 | \<Longrightarrow> SesKey \<notin> range shrK" | |
| 388 | apply (erule rev_mp) | |
| 389 | apply (erule kerbV.induct) | |
| 390 | apply (frule_tac [7] Says_ticket_parts) | |
| 391 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast) | |
| 392 | done | |
| 393 | ||
| 394 | lemma authTicket_authentic: | |
| 395 | "\<lbrakk> Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Ta\<rbrace> | |
| 396 | \<in> parts (spies evs); | |
| 397 | evs \<in> kerbV \<rbrakk> | |
| 398 | \<Longrightarrow> Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Ta\<rbrace>, | |
| 399 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Ta\<rbrace>\<rbrace> | |
| 400 | \<in> set evs" | |
| 401 | apply (erule rev_mp) | |
| 402 | apply (erule kerbV.induct) | |
| 403 | apply (frule_tac [7] Says_ticket_parts) | |
| 404 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 405 | txt{*Fake, K4*}
 | |
| 406 | apply (blast+) | |
| 407 | done | |
| 408 | ||
| 409 | lemma authTicket_crypt_authK: | |
| 410 | "\<lbrakk> Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> | |
| 411 | \<in> parts (spies evs); | |
| 412 | evs \<in> kerbV \<rbrakk> | |
| 413 | \<Longrightarrow> authK \<in> authKeys evs" | |
| 414 | apply (frule authTicket_authentic, assumption) | |
| 415 | apply (simp (no_asm) add: authKeys_def) | |
| 416 | apply blast | |
| 417 | done | |
| 418 | ||
| 419 | text{*Describes the form of servK, servTicket and authK sent by Tgs*}
 | |
| 420 | lemma Says_Tgs_message_form: | |
| 421 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, servTicket\<rbrace> | |
| 422 | \<in> set evs; | |
| 423 | evs \<in> kerbV \<rbrakk> | |
| 424 | \<Longrightarrow> B \<noteq> Tgs \<and> | |
| 425 | servK \<notin> range shrK \<and> servK \<notin> authKeys evs \<and> servK \<in> symKeys \<and> | |
| 426 | servTicket = (Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Ts\<rbrace>) \<and> | |
| 427 | authK \<notin> range shrK \<and> authK \<in> authKeys evs \<and> authK \<in> symKeys" | |
| 428 | apply (erule rev_mp) | |
| 429 | apply (erule kerbV.induct) | |
| 430 | apply (simp_all add: authKeys_insert authKeys_not_insert authKeys_empty authKeys_simp, blast, auto) | |
| 431 | txt{*Three subcases of Message 4*}
 | |
| 432 | apply (blast dest!: authKeys_used Says_Kas_message_form) | |
| 433 | apply (blast dest!: SesKey_is_session_key) | |
| 434 | apply (blast dest: authTicket_crypt_authK) | |
| 435 | done | |
| 436 | ||
| 437 | ||
| 438 | ||
| 439 | (* | |
| 440 | lemma authTicket_form: | |
| 441 | lemma servTicket_form: | |
| 442 | lemma Says_kas_message_form: | |
| 443 | lemma Says_tgs_message_form: | |
| 444 | ||
| 445 | cannot be proved for version V, but a new proof strategy can be used in their | |
| 446 | place. The new strategy merely says that both the authTicket and the servTicket | |
| 447 | are in parts and in analz as soon as they appear, using lemmas Says_ticket_parts and Says_ticket_analz. | |
| 448 | The new strategy always lets the simplifier solve cases K3 and K5, saving on | |
| 449 | long dedicated analyses, which seemed unavoidable. For this reason, lemma | |
| 450 | servK_notin_authKeysD is no longer needed. | |
| 451 | *) | |
| 452 | ||
| 453 | subsection{*Authenticity theorems: confirm origin of sensitive messages*}
 | |
| 454 | ||
| 455 | lemma authK_authentic: | |
| 456 | "\<lbrakk> Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace> | |
| 457 | \<in> parts (spies evs); | |
| 458 | A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 459 | \<Longrightarrow> \<exists> AT. Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace>, AT\<rbrace> | |
| 460 | \<in> set evs" | |
| 461 | apply (erule rev_mp) | |
| 462 | apply (erule kerbV.induct) | |
| 463 | apply (frule_tac [7] Says_ticket_parts) | |
| 464 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 465 | apply blast+ | |
| 466 | done | |
| 467 | ||
| 468 | text{*If a certain encrypted message appears then it originated with Tgs*}
 | |
| 469 | lemma servK_authentic: | |
| 470 | "\<lbrakk> Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace> | |
| 471 | \<in> parts (spies evs); | |
| 472 | Key authK \<notin> analz (spies evs); | |
| 473 | authK \<notin> range shrK; | |
| 474 | evs \<in> kerbV \<rbrakk> | |
| 475 | \<Longrightarrow> \<exists>A ST. Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, ST\<rbrace> | |
| 476 | \<in> set evs" | |
| 477 | apply (erule rev_mp) | |
| 478 | apply (erule rev_mp) | |
| 479 | apply (erule kerbV.induct, analz_mono_contra) | |
| 480 | apply (frule_tac [7] Says_ticket_parts) | |
| 481 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 482 | apply blast+ | |
| 483 | done | |
| 484 | ||
| 485 | lemma servK_authentic_bis: | |
| 486 | "\<lbrakk> Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace> | |
| 487 | \<in> parts (spies evs); | |
| 488 | Key authK \<notin> analz (spies evs); | |
| 489 | B \<noteq> Tgs; | |
| 490 | evs \<in> kerbV \<rbrakk> | |
| 491 | \<Longrightarrow> \<exists>A ST. Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, ST\<rbrace> | |
| 492 | \<in> set evs" | |
| 493 | apply (erule rev_mp) | |
| 494 | apply (erule rev_mp) | |
| 495 | apply (erule kerbV.induct, analz_mono_contra) | |
| 496 | apply (frule_tac [7] Says_ticket_parts) | |
| 497 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast+) | |
| 498 | done | |
| 499 | ||
| 500 | text{*Authenticity of servK for B*}
 | |
| 501 | lemma servTicket_authentic_Tgs: | |
| 502 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Ts\<rbrace> | |
| 503 | \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad; | |
| 504 | evs \<in> kerbV \<rbrakk> | |
| 505 | \<Longrightarrow> \<exists>authK. | |
| 506 | Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, | |
| 507 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Ts\<rbrace>\<rbrace> | |
| 508 | \<in> set evs" | |
| 509 | apply (erule rev_mp) | |
| 510 | apply (erule kerbV.induct) | |
| 511 | apply (frule_tac [7] Says_ticket_parts) | |
| 512 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast+) | |
| 513 | done | |
| 514 | ||
| 515 | text{*Anticipated here from next subsection*}
 | |
| 516 | lemma K4_imp_K2: | |
| 517 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 518 | \<in> set evs; evs \<in> kerbV\<rbrakk> | |
| 519 | \<Longrightarrow> \<exists>Ta. Says Kas A | |
| 520 | \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 521 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<rbrace> | |
| 522 | \<in> set evs" | |
| 523 | apply (erule rev_mp) | |
| 524 | apply (erule kerbV.induct) | |
| 525 | apply (frule_tac [7] Says_ticket_parts) | |
| 526 | apply (frule_tac [5] Says_ticket_parts, simp_all, auto) | |
| 527 | apply (blast dest!: Says_imp_spies [THEN parts.Inj, THEN parts.Fst, THEN authTicket_authentic]) | |
| 528 | done | |
| 529 | ||
| 530 | text{*Anticipated here from next subsection*}
 | |
| 531 | lemma u_K4_imp_K2: | |
| 532 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> \<in> set evs; evs \<in> kerbV\<rbrakk> | |
| 533 | \<Longrightarrow> \<exists>Ta. Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 534 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<rbrace> | |
| 535 | \<in> set evs | |
| 536 | \<and> servKlife + Ts <= authKlife + Ta" | |
| 537 | apply (erule rev_mp) | |
| 538 | apply (erule kerbV.induct) | |
| 539 | apply (frule_tac [7] Says_ticket_parts) | |
| 540 | apply (frule_tac [5] Says_ticket_parts, simp_all, auto) | |
| 541 | apply (blast dest!: Says_imp_spies [THEN parts.Inj, THEN parts.Fst, THEN authTicket_authentic]) | |
| 542 | done | |
| 543 | ||
| 544 | lemma servTicket_authentic_Kas: | |
| 545 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 546 | \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad; | |
| 547 | evs \<in> kerbV \<rbrakk> | |
| 548 | \<Longrightarrow> \<exists>authK Ta. | |
| 549 | Says Kas A | |
| 550 | \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 551 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<rbrace> | |
| 552 | \<in> set evs" | |
| 553 | apply (blast dest!: servTicket_authentic_Tgs K4_imp_K2) | |
| 554 | done | |
| 555 | ||
| 556 | lemma u_servTicket_authentic_Kas: | |
| 557 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 558 | \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad; | |
| 559 | evs \<in> kerbV \<rbrakk> | |
| 560 | \<Longrightarrow> \<exists>authK Ta. | |
| 561 | Says Kas A | |
| 562 | \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 563 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<rbrace> | |
| 564 | \<in> set evs \<and> | |
| 565 | servKlife + Ts <= authKlife + Ta" | |
| 566 | apply (blast dest!: servTicket_authentic_Tgs u_K4_imp_K2) | |
| 567 | done | |
| 568 | ||
| 569 | lemma servTicket_authentic: | |
| 570 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 571 | \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad; | |
| 572 | evs \<in> kerbV \<rbrakk> | |
| 573 | \<Longrightarrow> \<exists>Ta authK. | |
| 574 | Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 575 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<rbrace> \<in> set evs | |
| 576 | \<and> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 577 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace> | |
| 578 | \<in> set evs" | |
| 579 | apply (blast dest: servTicket_authentic_Tgs K4_imp_K2) | |
| 580 | done | |
| 581 | ||
| 582 | lemma u_servTicket_authentic: | |
| 583 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 584 | \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad; | |
| 585 | evs \<in> kerbV \<rbrakk> | |
| 586 | \<Longrightarrow> \<exists>Ta authK. | |
| 587 | Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 588 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace> \<in> set evs | |
| 589 | \<and> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 590 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace> | |
| 591 | \<in> set evs | |
| 592 | \<and> servKlife + Ts <= authKlife + Ta" | |
| 593 | apply (blast dest: servTicket_authentic_Tgs u_K4_imp_K2) | |
| 594 | done | |
| 595 | ||
| 596 | lemma u_NotexpiredSK_NotexpiredAK: | |
| 597 | "\<lbrakk> \<not> expiredSK Ts evs; servKlife + Ts <= authKlife + Ta \<rbrakk> | |
| 598 | \<Longrightarrow> \<not> expiredAK Ta evs" | |
| 599 | apply (blast dest: leI le_trans dest: leD) | |
| 600 | done | |
| 601 | ||
| 602 | ||
| 603 | subsection{* Reliability: friendly agents send somthing if something else happened*}
 | |
| 604 | ||
| 605 | lemma K3_imp_K2: | |
| 606 | "\<lbrakk> Says A Tgs | |
| 607 | \<lbrace>authTicket, Crypt authK \<lbrace>Agent A, Number T2\<rbrace>, Agent B\<rbrace> | |
| 608 | \<in> set evs; | |
| 609 | A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 610 | \<Longrightarrow> \<exists>Ta AT. Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Ta\<rbrace>, | |
| 611 | AT\<rbrace> \<in> set evs" | |
| 612 | apply (erule rev_mp) | |
| 613 | apply (erule kerbV.induct) | |
| 614 | apply (frule_tac [7] Says_ticket_parts) | |
| 615 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast, blast) | |
| 616 | apply (blast dest: Says_imp_spies [THEN parts.Inj, THEN parts.Fst, THEN authK_authentic]) | |
| 617 | done | |
| 618 | ||
| 619 | text{*Anticipated here from next subsection. An authK is encrypted by one and only one Shared key. A servK is encrypted by one and only one authK.*}
 | |
| 620 | lemma Key_unique_SesKey: | |
| 621 | "\<lbrakk> Crypt K \<lbrace>Key SesKey, Agent B, T\<rbrace> | |
| 622 | \<in> parts (spies evs); | |
| 623 | Crypt K' \<lbrace>Key SesKey, Agent B', T'\<rbrace> | |
| 624 | \<in> parts (spies evs); Key SesKey \<notin> analz (spies evs); | |
| 625 | evs \<in> kerbV \<rbrakk> | |
| 626 | \<Longrightarrow> K=K' \<and> B=B' \<and> T=T'" | |
| 627 | apply (erule rev_mp) | |
| 628 | apply (erule rev_mp) | |
| 629 | apply (erule rev_mp) | |
| 630 | apply (erule kerbV.induct, analz_mono_contra) | |
| 631 | apply (frule_tac [7] Says_ticket_parts) | |
| 632 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 633 | txt{*Fake, K2, K4*}
 | |
| 634 | apply (blast+) | |
| 635 | done | |
| 636 | ||
| 637 | text{*This inevitably has an existential form in version V*}
 | |
| 638 | lemma Says_K5: | |
| 639 | "\<lbrakk> Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<in> parts (spies evs); | |
| 640 | Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 641 | servTicket\<rbrace> \<in> set evs; | |
| 642 | Key servK \<notin> analz (spies evs); | |
| 643 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 644 | \<Longrightarrow> \<exists> ST. Says A B \<lbrace>ST, Crypt servK \<lbrace>Agent A, Number T3\<rbrace>\<rbrace> \<in> set evs" | |
| 645 | apply (erule rev_mp) | |
| 646 | apply (erule rev_mp) | |
| 647 | apply (erule rev_mp) | |
| 648 | apply (erule kerbV.induct, analz_mono_contra) | |
| 649 | apply (frule_tac [5] Says_ticket_parts) | |
| 650 | apply (frule_tac [7] Says_ticket_parts) | |
| 651 | apply (simp_all (no_asm_simp) add: all_conj_distrib) | |
| 652 | apply blast | |
| 653 | txt{*K3*}
 | |
| 654 | apply (blast dest: authK_authentic Says_Kas_message_form Says_Tgs_message_form) | |
| 655 | txt{*K4*}
 | |
| 656 | apply (force dest!: Crypt_imp_keysFor) | |
| 657 | txt{*K5*}
 | |
| 658 | apply (blast dest: Key_unique_SesKey) | |
| 659 | done | |
| 660 | ||
| 661 | text{*Anticipated here from next subsection*}
 | |
| 662 | lemma unique_CryptKey: | |
| 663 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key SesKey, T\<rbrace> | |
| 664 | \<in> parts (spies evs); | |
| 665 | Crypt (shrK B') \<lbrace>Agent A', Agent B', Key SesKey, T'\<rbrace> | |
| 666 | \<in> parts (spies evs); Key SesKey \<notin> analz (spies evs); | |
| 667 | evs \<in> kerbV \<rbrakk> | |
| 668 | \<Longrightarrow> A=A' & B=B' & T=T'" | |
| 669 | apply (erule rev_mp) | |
| 670 | apply (erule rev_mp) | |
| 671 | apply (erule rev_mp) | |
| 672 | apply (erule kerbV.induct, analz_mono_contra) | |
| 673 | apply (frule_tac [7] Says_ticket_parts) | |
| 674 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 675 | txt{*Fake, K2, K4*}
 | |
| 676 | apply (blast+) | |
| 677 | done | |
| 678 | ||
| 679 | lemma Says_K6: | |
| 680 | "\<lbrakk> Crypt servK (Number T3) \<in> parts (spies evs); | |
| 681 | Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 682 | servTicket\<rbrace> \<in> set evs; | |
| 683 | Key servK \<notin> analz (spies evs); | |
| 684 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 685 | \<Longrightarrow> Says B A (Crypt servK (Number T3)) \<in> set evs" | |
| 686 | apply (frule Says_Tgs_message_form, assumption, clarify) | |
| 687 | apply (erule rev_mp) | |
| 688 | apply (erule rev_mp) | |
| 689 | apply (erule rev_mp) | |
| 690 | apply (erule kerbV.induct, analz_mono_contra) | |
| 691 | apply (frule_tac [7] Says_ticket_parts) | |
| 692 | apply (frule_tac [5] Says_ticket_parts) | |
| 693 | apply (simp_all (no_asm_simp)) | |
| 694 | ||
| 695 | txt{*fake*}
 | |
| 696 | apply blast | |
| 697 | txt{*K4*}
 | |
| 698 | apply (force dest!: Crypt_imp_keysFor, clarify) | |
| 699 | txt{*K6*}
 | |
| 32404 | 700 | apply (metis Says_imp_spies Says_ticket_parts analz.Fst analz.Inj analz_conj_parts unique_CryptKey) | 
| 18886 | 701 | done | 
| 702 | ||
| 703 | text{*Needs a unicity theorem, hence moved here*}
 | |
| 704 | lemma servK_authentic_ter: | |
| 705 | "\<lbrakk> Says Kas A | |
| 706 | \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Ta\<rbrace>, authTicket\<rbrace> \<in> set evs; | |
| 707 | Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace> | |
| 708 | \<in> parts (spies evs); | |
| 709 | Key authK \<notin> analz (spies evs); | |
| 710 | evs \<in> kerbV \<rbrakk> | |
| 711 | \<Longrightarrow> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Ts\<rbrace>, | |
| 712 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Ts\<rbrace> \<rbrace> | |
| 713 | \<in> set evs" | |
| 714 | apply (frule Says_Kas_message_form, assumption) | |
| 715 | apply clarify | |
| 716 | apply (erule rev_mp) | |
| 717 | apply (erule rev_mp) | |
| 718 | apply (erule rev_mp) | |
| 719 | apply (erule kerbV.induct, analz_mono_contra) | |
| 720 | apply (frule_tac [7] Says_ticket_parts) | |
| 721 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast) | |
| 722 | txt{*K2 and K4 remain*}
 | |
| 723 | apply (blast dest!: servK_authentic Says_Tgs_message_form authKeys_used) | |
| 724 | apply (blast dest!: unique_CryptKey) | |
| 725 | done | |
| 726 | ||
| 727 | ||
| 728 | subsection{*Unicity Theorems*}
 | |
| 729 | ||
| 730 | text{* The session key, if secure, uniquely identifies the Ticket
 | |
| 731 | whether authTicket or servTicket. As a matter of fact, one can read | |
| 732 | also Tgs in the place of B. *} | |
| 733 | ||
| 734 | ||
| 735 | lemma unique_authKeys: | |
| 736 | "\<lbrakk> Says Kas A | |
| 737 | \<lbrace>Crypt Ka \<lbrace>Key authK, Agent Tgs, Ta\<rbrace>, X\<rbrace> \<in> set evs; | |
| 738 | Says Kas A' | |
| 739 | \<lbrace>Crypt Ka' \<lbrace>Key authK, Agent Tgs, Ta'\<rbrace>, X'\<rbrace> \<in> set evs; | |
| 740 | evs \<in> kerbV \<rbrakk> \<Longrightarrow> A=A' \<and> Ka=Ka' \<and> Ta=Ta' \<and> X=X'" | |
| 741 | apply (erule rev_mp) | |
| 742 | apply (erule rev_mp) | |
| 743 | apply (erule kerbV.induct) | |
| 744 | apply (frule_tac [7] Says_ticket_parts) | |
| 745 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 746 | apply blast+ | |
| 747 | done | |
| 748 | ||
| 749 | text{* servK uniquely identifies the message from Tgs *}
 | |
| 750 | lemma unique_servKeys: | |
| 751 | "\<lbrakk> Says Tgs A | |
| 752 | \<lbrace>Crypt K \<lbrace>Key servK, Agent B, Ts\<rbrace>, X\<rbrace> \<in> set evs; | |
| 753 | Says Tgs A' | |
| 754 | \<lbrace>Crypt K' \<lbrace>Key servK, Agent B', Ts'\<rbrace>, X'\<rbrace> \<in> set evs; | |
| 755 | evs \<in> kerbV \<rbrakk> \<Longrightarrow> A=A' \<and> B=B' \<and> K=K' \<and> Ts=Ts' \<and> X=X'" | |
| 756 | apply (erule rev_mp) | |
| 757 | apply (erule rev_mp) | |
| 758 | apply (erule kerbV.induct) | |
| 759 | apply (frule_tac [7] Says_ticket_parts) | |
| 760 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 761 | apply blast+ | |
| 762 | done | |
| 763 | ||
| 764 | subsection{*Lemmas About the Predicate @{term AKcryptSK}*}
 | |
| 765 | ||
| 766 | lemma not_AKcryptSK_Nil [iff]: "\<not> AKcryptSK authK servK []" | |
| 767 | apply (simp add: AKcryptSK_def) | |
| 768 | done | |
| 769 | ||
| 770 | lemma AKcryptSKI: | |
| 771 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, tt\<rbrace>, X \<rbrace> \<in> set evs; | |
| 772 | evs \<in> kerbV \<rbrakk> \<Longrightarrow> AKcryptSK authK servK evs" | |
| 773 | apply (unfold AKcryptSK_def) | |
| 774 | apply (blast dest: Says_Tgs_message_form) | |
| 775 | done | |
| 776 | ||
| 777 | lemma AKcryptSK_Says [simp]: | |
| 778 | "AKcryptSK authK servK (Says S A X # evs) = | |
| 779 | (S = Tgs \<and> | |
| 780 | (\<exists>B tt. X = \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, tt\<rbrace>, | |
| 781 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, tt\<rbrace> \<rbrace>) | |
| 782 | | AKcryptSK authK servK evs)" | |
| 783 | apply (unfold AKcryptSK_def) | |
| 784 | apply (simp (no_asm)) | |
| 785 | apply blast | |
| 786 | done | |
| 787 | ||
| 788 | lemma AKcryptSK_Notes [simp]: | |
| 789 | "AKcryptSK authK servK (Notes A X # evs) = | |
| 790 | AKcryptSK authK servK evs" | |
| 791 | apply (unfold AKcryptSK_def) | |
| 792 | apply (simp (no_asm)) | |
| 793 | done | |
| 794 | ||
| 795 | (*A fresh authK cannot be associated with any other | |
| 796 | (with respect to a given trace). *) | |
| 797 | lemma Auth_fresh_not_AKcryptSK: | |
| 798 | "\<lbrakk> Key authK \<notin> used evs; evs \<in> kerbV \<rbrakk> | |
| 799 | \<Longrightarrow> \<not> AKcryptSK authK servK evs" | |
| 800 | apply (unfold AKcryptSK_def) | |
| 801 | apply (erule rev_mp) | |
| 802 | apply (erule kerbV.induct) | |
| 803 | apply (frule_tac [7] Says_ticket_parts) | |
| 804 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast) | |
| 805 | done | |
| 806 | ||
| 807 | (*A fresh servK cannot be associated with any other | |
| 808 | (with respect to a given trace). *) | |
| 809 | lemma Serv_fresh_not_AKcryptSK: | |
| 810 | "Key servK \<notin> used evs \<Longrightarrow> \<not> AKcryptSK authK servK evs" | |
| 811 | apply (unfold AKcryptSK_def, blast) | |
| 812 | done | |
| 813 | ||
| 814 | lemma authK_not_AKcryptSK: | |
| 815 | "\<lbrakk> Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, tk\<rbrace> | |
| 816 | \<in> parts (spies evs); evs \<in> kerbV \<rbrakk> | |
| 817 | \<Longrightarrow> \<not> AKcryptSK K authK evs" | |
| 818 | apply (erule rev_mp) | |
| 819 | apply (erule kerbV.induct) | |
| 820 | apply (frule_tac [7] Says_ticket_parts) | |
| 821 | apply (frule_tac [5] Says_ticket_parts, simp_all) | |
| 822 | txt{*Fake*}
 | |
| 823 | apply blast | |
| 824 | txt{*K2: by freshness*}
 | |
| 825 | apply (simp add: AKcryptSK_def) | |
| 826 | apply blast | |
| 827 | txt{*K4*}
 | |
| 828 | apply blast | |
| 829 | done | |
| 830 | ||
| 831 | text{*A secure serverkey cannot have been used to encrypt others*}
 | |
| 832 | lemma servK_not_AKcryptSK: | |
| 833 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key SK, tt\<rbrace> \<in> parts (spies evs); | |
| 834 | Key SK \<notin> analz (spies evs); SK \<in> symKeys; | |
| 835 | B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 836 | \<Longrightarrow> \<not> AKcryptSK SK K evs" | |
| 837 | apply (erule rev_mp) | |
| 838 | apply (erule rev_mp) | |
| 839 | apply (erule kerbV.induct, analz_mono_contra) | |
| 840 | apply (frule_tac [7] Says_ticket_parts) | |
| 841 | apply (frule_tac [5] Says_ticket_parts, simp_all, blast) | |
| 32404 | 842 | txt{*K4*}
 | 
| 843 | apply (metis Auth_fresh_not_AKcryptSK Crypt_imp_invKey_keysFor Says_ticket_analz | |
| 844 | analz.Fst invKey_K new_keys_not_analzd parts.Fst Says_imp_parts_knows_Spy | |
| 845 | unique_CryptKey) | |
| 18886 | 846 | done | 
| 847 | ||
| 848 | text{*Long term keys are not issued as servKeys*}
 | |
| 849 | lemma shrK_not_AKcryptSK: | |
| 850 | "evs \<in> kerbV \<Longrightarrow> \<not> AKcryptSK K (shrK A) evs" | |
| 851 | apply (unfold AKcryptSK_def) | |
| 852 | apply (erule kerbV.induct) | |
| 853 | apply (frule_tac [7] Says_ticket_parts) | |
| 854 | apply (frule_tac [5] Says_ticket_parts, auto) | |
| 855 | done | |
| 856 | ||
| 857 | text{*The Tgs message associates servK with authK and therefore not with any
 | |
| 858 | other key authK.*} | |
| 859 | lemma Says_Tgs_AKcryptSK: | |
| 860 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, tt\<rbrace>, X \<rbrace> | |
| 861 | \<in> set evs; | |
| 862 | authK' \<noteq> authK; evs \<in> kerbV \<rbrakk> | |
| 863 | \<Longrightarrow> \<not> AKcryptSK authK' servK evs" | |
| 864 | apply (unfold AKcryptSK_def) | |
| 865 | apply (blast dest: unique_servKeys) | |
| 866 | done | |
| 867 | ||
| 868 | lemma AKcryptSK_not_AKcryptSK: | |
| 869 | "\<lbrakk> AKcryptSK authK servK evs; evs \<in> kerbV \<rbrakk> | |
| 870 | \<Longrightarrow> \<not> AKcryptSK servK K evs" | |
| 871 | apply (erule rev_mp) | |
| 872 | apply (erule kerbV.induct) | |
| 873 | apply (frule_tac [7] Says_ticket_parts) | |
| 874 | apply (frule_tac [5] Says_ticket_parts) | |
| 875 | apply (simp_all, safe) | |
| 876 | txt{*K4 splits into subcases*}
 | |
| 877 | (*apply simp_all*) | |
| 878 | prefer 4 apply (blast dest!: authK_not_AKcryptSK) | |
| 879 | txt{*servK is fresh and so could not have been used, by
 | |
| 880 |    @{text new_keys_not_used}*}
 | |
| 881 | prefer 2 | |
| 882 | apply (force dest!: Crypt_imp_invKey_keysFor simp add: AKcryptSK_def) | |
| 883 | txt{*Others by freshness*}
 | |
| 884 | apply (blast+) | |
| 885 | done | |
| 886 | ||
| 887 | lemma not_different_AKcryptSK: | |
| 888 | "\<lbrakk> AKcryptSK authK servK evs; | |
| 889 | authK' \<noteq> authK; evs \<in> kerbV \<rbrakk> | |
| 890 | \<Longrightarrow> \<not> AKcryptSK authK' servK evs \<and> servK \<in> symKeys" | |
| 891 | apply (simp add: AKcryptSK_def) | |
| 892 | apply (blast dest: unique_servKeys Says_Tgs_message_form) | |
| 893 | done | |
| 894 | ||
| 895 | text{*The only session keys that can be found with the help of session keys are
 | |
| 896 | those sent by Tgs in step K4. *} | |
| 897 | ||
| 898 | text{*We take some pains to express the property
 | |
| 899 | as a logical equivalence so that the simplifier can apply it.*} | |
| 900 | lemma Key_analz_image_Key_lemma: | |
| 901 | "P \<longrightarrow> (Key K \<in> analz (Key`KK Un H)) \<longrightarrow> (K:KK | Key K \<in> analz H) | |
| 902 | \<Longrightarrow> | |
| 903 | P \<longrightarrow> (Key K \<in> analz (Key`KK Un H)) = (K:KK | Key K \<in> analz H)" | |
| 904 | by (blast intro: analz_mono [THEN subsetD]) | |
| 905 | ||
| 906 | ||
| 907 | lemma AKcryptSK_analz_insert: | |
| 908 | "\<lbrakk> AKcryptSK K K' evs; K \<in> symKeys; evs \<in> kerbV \<rbrakk> | |
| 909 | \<Longrightarrow> Key K' \<in> analz (insert (Key K) (spies evs))" | |
| 910 | apply (simp add: AKcryptSK_def, clarify) | |
| 911 | apply (drule Says_imp_spies [THEN analz.Inj, THEN analz_insertI], auto) | |
| 912 | done | |
| 913 | ||
| 914 | lemma authKeys_are_not_AKcryptSK: | |
| 915 | "\<lbrakk> K \<in> authKeys evs Un range shrK; evs \<in> kerbV \<rbrakk> | |
| 916 | \<Longrightarrow> \<forall>SK. \<not> AKcryptSK SK K evs \<and> K \<in> symKeys" | |
| 917 | apply (simp add: authKeys_def AKcryptSK_def) | |
| 918 | apply (blast dest: Says_Kas_message_form Says_Tgs_message_form) | |
| 919 | done | |
| 920 | ||
| 921 | lemma not_authKeys_not_AKcryptSK: | |
| 922 | "\<lbrakk> K \<notin> authKeys evs; | |
| 923 | K \<notin> range shrK; evs \<in> kerbV \<rbrakk> | |
| 924 | \<Longrightarrow> \<forall>SK. \<not> AKcryptSK K SK evs" | |
| 925 | apply (simp add: AKcryptSK_def) | |
| 926 | apply (blast dest: Says_Tgs_message_form) | |
| 927 | done | |
| 928 | ||
| 929 | ||
| 930 | subsection{*Secrecy Theorems*}
 | |
| 931 | ||
| 932 | text{*For the Oops2 case of the next theorem*}
 | |
| 933 | lemma Oops2_not_AKcryptSK: | |
| 934 | "\<lbrakk> evs \<in> kerbV; | |
| 935 | Says Tgs A \<lbrace>Crypt authK | |
| 936 | \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 937 | \<in> set evs \<rbrakk> | |
| 938 | \<Longrightarrow> \<not> AKcryptSK servK SK evs" | |
| 939 | apply (blast dest: AKcryptSKI AKcryptSK_not_AKcryptSK) | |
| 940 | done | |
| 941 | ||
| 942 | text{* Big simplification law for keys SK that are not crypted by keys in KK
 | |
| 943 | It helps prove three, otherwise hard, facts about keys. These facts are | |
| 944 | exploited as simplification laws for analz, and also "limit the damage" | |
| 945 | in case of loss of a key to the spy. See ESORICS98.*} | |
| 946 | lemma Key_analz_image_Key [rule_format (no_asm)]: | |
| 947 | "evs \<in> kerbV \<Longrightarrow> | |
| 948 | (\<forall>SK KK. SK \<in> symKeys & KK <= -(range shrK) \<longrightarrow> | |
| 949 | (\<forall>K \<in> KK. \<not> AKcryptSK K SK evs) \<longrightarrow> | |
| 950 | (Key SK \<in> analz (Key`KK Un (spies evs))) = | |
| 951 | (SK \<in> KK | Key SK \<in> analz (spies evs)))" | |
| 952 | apply (erule kerbV.induct) | |
| 953 | apply (frule_tac [10] Oops_range_spies2) | |
| 954 | apply (frule_tac [9] Oops_range_spies1) | |
| 955 | (*Used to apply Says_tgs_message form, which is no longer available. | |
| 956 | Instead\<dots>*) | |
| 957 | apply (drule_tac [7] Says_ticket_analz) | |
| 958 | (*Used to apply Says_kas_message form, which is no longer available. | |
| 959 | Instead\<dots>*) | |
| 960 | apply (drule_tac [5] Says_ticket_analz) | |
| 961 | apply (safe del: impI intro!: Key_analz_image_Key_lemma [THEN impI]) | |
| 962 | txt{*Case-splits for Oops1 and message 5: the negated case simplifies using
 | |
| 963 | the induction hypothesis*} | |
| 964 | apply (case_tac [9] "AKcryptSK authK SK evsO1") | |
| 965 | apply (case_tac [7] "AKcryptSK servK SK evs5") | |
| 966 | apply (simp_all del: image_insert | |
| 967 | add: analz_image_freshK_simps AKcryptSK_Says shrK_not_AKcryptSK | |
| 968 | Oops2_not_AKcryptSK Auth_fresh_not_AKcryptSK | |
| 969 | Serv_fresh_not_AKcryptSK Says_Tgs_AKcryptSK Spy_analz_shrK) | |
| 970 | txt{*Fake*} 
 | |
| 971 | apply spy_analz | |
| 972 | txt{*K2*}
 | |
| 973 | apply blast | |
| 974 | txt{*Cases K3 and K5 solved by the simplifier thanks to the ticket being in 
 | |
| 975 | analz - this strategy is new wrt version IV*} | |
| 976 | txt{*K4*}
 | |
| 977 | apply (blast dest!: authK_not_AKcryptSK) | |
| 978 | txt{*Oops1*}
 | |
| 32404 | 979 | apply (metis AKcryptSK_analz_insert insert_Key_singleton) | 
| 18886 | 980 | done | 
| 981 | ||
| 982 | text{* First simplification law for analz: no session keys encrypt
 | |
| 983 | authentication keys or shared keys. *} | |
| 984 | lemma analz_insert_freshK1: | |
| 985 | "\<lbrakk> evs \<in> kerbV; K \<in> authKeys evs Un range shrK; | |
| 986 | SesKey \<notin> range shrK \<rbrakk> | |
| 987 | \<Longrightarrow> (Key K \<in> analz (insert (Key SesKey) (spies evs))) = | |
| 988 | (K = SesKey | Key K \<in> analz (spies evs))" | |
| 989 | apply (frule authKeys_are_not_AKcryptSK, assumption) | |
| 990 | apply (simp del: image_insert | |
| 991 | add: analz_image_freshK_simps add: Key_analz_image_Key) | |
| 992 | done | |
| 993 | ||
| 994 | ||
| 995 | text{* Second simplification law for analz: no service keys encrypt any other keys.*}
 | |
| 996 | lemma analz_insert_freshK2: | |
| 997 | "\<lbrakk> evs \<in> kerbV; servK \<notin> (authKeys evs); servK \<notin> range shrK; | |
| 998 | K \<in> symKeys \<rbrakk> | |
| 999 | \<Longrightarrow> (Key K \<in> analz (insert (Key servK) (spies evs))) = | |
| 1000 | (K = servK | Key K \<in> analz (spies evs))" | |
| 1001 | apply (frule not_authKeys_not_AKcryptSK, assumption, assumption) | |
| 1002 | apply (simp del: image_insert | |
| 1003 | add: analz_image_freshK_simps add: Key_analz_image_Key) | |
| 1004 | done | |
| 1005 | ||
| 1006 | ||
| 1007 | text{* Third simplification law for analz: only one authentication key encrypts a certain service key.*}
 | |
| 1008 | ||
| 1009 | lemma analz_insert_freshK3: | |
| 1010 | "\<lbrakk> AKcryptSK authK servK evs; | |
| 1011 | authK' \<noteq> authK; authK' \<notin> range shrK; evs \<in> kerbV \<rbrakk> | |
| 1012 | \<Longrightarrow> (Key servK \<in> analz (insert (Key authK') (spies evs))) = | |
| 1013 | (servK = authK' | Key servK \<in> analz (spies evs))" | |
| 1014 | apply (drule_tac authK' = authK' in not_different_AKcryptSK, blast, assumption) | |
| 1015 | apply (simp del: image_insert | |
| 1016 | add: analz_image_freshK_simps add: Key_analz_image_Key) | |
| 1017 | done | |
| 1018 | ||
| 1019 | lemma analz_insert_freshK3_bis: | |
| 1020 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 1021 | \<in> set evs; | |
| 1022 | authK \<noteq> authK'; authK' \<notin> range shrK; evs \<in> kerbV \<rbrakk> | |
| 1023 | \<Longrightarrow> (Key servK \<in> analz (insert (Key authK') (spies evs))) = | |
| 1024 | (servK = authK' | Key servK \<in> analz (spies evs))" | |
| 1025 | apply (frule AKcryptSKI, assumption) | |
| 1026 | apply (simp add: analz_insert_freshK3) | |
| 1027 | done | |
| 1028 | ||
| 1029 | text{*a weakness of the protocol*}
 | |
| 1030 | lemma authK_compromises_servK: | |
| 1031 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 1032 | \<in> set evs; authK \<in> symKeys; | |
| 1033 | Key authK \<in> analz (spies evs); evs \<in> kerbV \<rbrakk> | |
| 1034 | \<Longrightarrow> Key servK \<in> analz (spies evs)" | |
| 32404 | 1035 | by (metis Says_imp_analz_Spy analz.Fst analz_Decrypt') | 
| 1036 | ||
| 18886 | 1037 | |
| 1038 | text{*lemma @{text servK_notin_authKeysD} not needed in version V*}
 | |
| 1039 | ||
| 1040 | text{*If Spy sees the Authentication Key sent in msg K2, then
 | |
| 1041 | the Key has expired.*} | |
| 1042 | lemma Confidentiality_Kas_lemma [rule_format]: | |
| 1043 | "\<lbrakk> authK \<in> symKeys; A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1044 | \<Longrightarrow> Says Kas A | |
| 1045 | \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, | |
| 1046 | Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace> | |
| 1047 | \<in> set evs \<longrightarrow> | |
| 1048 | Key authK \<in> analz (spies evs) \<longrightarrow> | |
| 1049 | expiredAK Ta evs" | |
| 1050 | apply (erule kerbV.induct) | |
| 1051 | apply (frule_tac [10] Oops_range_spies2) | |
| 1052 | apply (frule_tac [9] Oops_range_spies1) | |
| 1053 | apply (frule_tac [7] Says_ticket_analz) | |
| 1054 | apply (frule_tac [5] Says_ticket_analz) | |
| 1055 | apply (safe del: impI conjI impCE) | |
| 1056 | apply (simp_all (no_asm_simp) add: Says_Kas_message_form less_SucI analz_insert_eq not_parts_not_analz analz_insert_freshK1 pushes) | |
| 1057 | txt{*Fake*}
 | |
| 1058 | apply spy_analz | |
| 1059 | txt{*K2*}
 | |
| 1060 | apply blast | |
| 1061 | txt{*K4*}
 | |
| 1062 | apply blast | |
| 1063 | txt{*Oops1*}
 | |
| 1064 | apply (blast dest!: unique_authKeys intro: less_SucI) | |
| 1065 | txt{*Oops2*}
 | |
| 1066 | apply (blast dest: Says_Tgs_message_form Says_Kas_message_form) | |
| 1067 | done | |
| 1068 | ||
| 1069 | lemma Confidentiality_Kas: | |
| 1070 | "\<lbrakk> Says Kas A | |
| 1071 | \<lbrace>Crypt Ka \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, authTicket\<rbrace> | |
| 1072 | \<in> set evs; | |
| 1073 | \<not> expiredAK Ta evs; | |
| 1074 | A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1075 | \<Longrightarrow> Key authK \<notin> analz (spies evs)" | |
| 1076 | apply (blast dest: Says_Kas_message_form Confidentiality_Kas_lemma) | |
| 1077 | done | |
| 1078 | ||
| 1079 | text{*If Spy sees the Service Key sent in msg K4, then
 | |
| 1080 | the Key has expired.*} | |
| 1081 | ||
| 1082 | lemma Confidentiality_lemma [rule_format]: | |
| 1083 | "\<lbrakk> Says Tgs A | |
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1084 | \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | 
| 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1085 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace> | 
| 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1086 | \<in> set evs; | 
| 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1087 | Key authK \<notin> analz (spies evs); | 
| 18886 | 1088 | servK \<in> symKeys; | 
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1089 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | 
| 18886 | 1090 | \<Longrightarrow> Key servK \<in> analz (spies evs) \<longrightarrow> | 
| 32960 
69916a850301
eliminated hard tabulators, guessing at each author's individual tab-width;
 wenzelm parents: 
32404diff
changeset | 1091 | expiredSK Ts evs" | 
| 18886 | 1092 | apply (erule rev_mp) | 
| 1093 | apply (erule rev_mp) | |
| 1094 | apply (erule kerbV.induct) | |
| 1095 | apply (rule_tac [9] impI)+; | |
| 1096 |   --{*The Oops1 case is unusual: must simplify
 | |
| 1097 |     @{term "Authkey \<notin> analz (spies (ev#evs))"}, not letting
 | |
| 1098 |    @{text analz_mono_contra} weaken it to
 | |
| 1099 |    @{term "Authkey \<notin> analz (spies evs)"},
 | |
| 1100 |   for we then conclude @{term "authK \<noteq> authKa"}.*}
 | |
| 1101 | apply analz_mono_contra | |
| 1102 | apply (frule_tac [10] Oops_range_spies2) | |
| 1103 | apply (frule_tac [9] Oops_range_spies1) | |
| 1104 | apply (frule_tac [7] Says_ticket_analz) | |
| 1105 | apply (frule_tac [5] Says_ticket_analz) | |
| 1106 | apply (safe del: impI conjI impCE) | |
| 1107 | apply (simp_all add: less_SucI new_keys_not_analzd Says_Kas_message_form Says_Tgs_message_form analz_insert_eq not_parts_not_analz analz_insert_freshK1 analz_insert_freshK2 analz_insert_freshK3_bis pushes) | |
| 32404 | 1108 |     txt{*Fake*}
 | 
| 1109 | apply spy_analz | |
| 1110 |    txt{*K2*}
 | |
| 1111 | apply (blast intro: parts_insertI less_SucI) | |
| 1112 |   txt{*K4*}
 | |
| 1113 | apply (blast dest: authTicket_authentic Confidentiality_Kas) | |
| 1114 |  txt{*Oops1*}
 | |
| 18886 | 1115 | apply (blast dest: Says_Kas_message_form Says_Tgs_message_form intro: less_SucI) | 
| 1116 | txt{*Oops2*}
 | |
| 32404 | 1117 | apply (metis Suc_le_eq linorder_linear linorder_not_le msg.simps(2) unique_servKeys) | 
| 18886 | 1118 | done | 
| 1119 | ||
| 1120 | ||
| 1121 | text{* In the real world Tgs can't check wheter authK is secure! *}
 | |
| 1122 | lemma Confidentiality_Tgs: | |
| 1123 | "\<lbrakk> Says Tgs A | |
| 1124 | \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 1125 | \<in> set evs; | |
| 1126 | Key authK \<notin> analz (spies evs); | |
| 1127 | \<not> expiredSK Ts evs; | |
| 1128 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1129 | \<Longrightarrow> Key servK \<notin> analz (spies evs)" | |
| 1130 | apply (blast dest: Says_Tgs_message_form Confidentiality_lemma) | |
| 1131 | done | |
| 1132 | ||
| 1133 | text{* In the real world Tgs CAN check what Kas sends! *}
 | |
| 1134 | lemma Confidentiality_Tgs_bis: | |
| 1135 | "\<lbrakk> Says Kas A | |
| 1136 | \<lbrace>Crypt Ka \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace>, authTicket\<rbrace> | |
| 1137 | \<in> set evs; | |
| 1138 | Says Tgs A | |
| 1139 | \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 1140 | \<in> set evs; | |
| 1141 | \<not> expiredAK Ta evs; \<not> expiredSK Ts evs; | |
| 1142 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1143 | \<Longrightarrow> Key servK \<notin> analz (spies evs)" | |
| 1144 | apply (blast dest!: Confidentiality_Kas Confidentiality_Tgs) | |
| 1145 | done | |
| 1146 | ||
| 1147 | text{*Most general form*}
 | |
| 1148 | lemmas Confidentiality_Tgs_ter = authTicket_authentic [THEN Confidentiality_Tgs_bis] | |
| 1149 | ||
| 1150 | lemmas Confidentiality_Auth_A = authK_authentic [THEN exE, THEN Confidentiality_Kas] | |
| 1151 | ||
| 1152 | text{*Needs a confidentiality guarantee, hence moved here.
 | |
| 1153 | Authenticity of servK for A*} | |
| 1154 | lemma servK_authentic_bis_r: | |
| 1155 | "\<lbrakk> Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1156 | \<in> parts (spies evs); | |
| 1157 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1158 | \<in> parts (spies evs); | |
| 1159 | \<not> expiredAK Ta evs; A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1160 | \<Longrightarrow> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, | |
| 1161 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<rbrace> | |
| 1162 | \<in> set evs" | |
| 1163 | apply (frule authK_authentic, assumption, assumption) | |
| 1164 | apply (erule exE) | |
| 1165 | apply (drule Confidentiality_Auth_A, assumption, assumption) | |
| 1166 | apply (blast, assumption, assumption, assumption) | |
| 1167 | apply (blast dest: servK_authentic_ter) | |
| 1168 | done | |
| 1169 | ||
| 1170 | lemma Confidentiality_Serv_A: | |
| 1171 | "\<lbrakk> Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1172 | \<in> parts (spies evs); | |
| 1173 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1174 | \<in> parts (spies evs); | |
| 1175 | \<not> expiredAK Ta evs; \<not> expiredSK Ts evs; | |
| 1176 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1177 | \<Longrightarrow> Key servK \<notin> analz (spies evs)" | |
| 1178 | apply (drule authK_authentic, assumption, assumption) | |
| 1179 | apply (blast dest: Confidentiality_Kas Says_Kas_message_form servK_authentic_ter Confidentiality_Tgs_bis) | |
| 1180 | done | |
| 1181 | ||
| 1182 | lemma Confidentiality_B: | |
| 1183 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1184 | \<in> parts (spies evs); | |
| 1185 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1186 | \<in> parts (spies evs); | |
| 1187 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1188 | \<in> parts (spies evs); | |
| 1189 | \<not> expiredSK Ts evs; \<not> expiredAK Ta evs; | |
| 1190 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1191 | \<Longrightarrow> Key servK \<notin> analz (spies evs)" | |
| 1192 | apply (frule authK_authentic) | |
| 1193 | apply (erule_tac [3] exE) | |
| 1194 | apply (frule_tac [3] Confidentiality_Kas) | |
| 1195 | apply (frule_tac [6] servTicket_authentic, auto) | |
| 1196 | apply (blast dest!: Confidentiality_Tgs_bis dest: Says_Kas_message_form servK_authentic unique_servKeys unique_authKeys) | |
| 1197 | done | |
| 1198 | ||
| 1199 | lemma u_Confidentiality_B: | |
| 1200 | "\<lbrakk> Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1201 | \<in> parts (spies evs); | |
| 1202 | \<not> expiredSK Ts evs; | |
| 1203 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1204 | \<Longrightarrow> Key servK \<notin> analz (spies evs)" | |
| 1205 | apply (blast dest: u_servTicket_authentic u_NotexpiredSK_NotexpiredAK Confidentiality_Tgs_bis) | |
| 1206 | done | |
| 1207 | ||
| 1208 | ||
| 1209 | ||
| 1210 | subsection{*Parties authentication: each party verifies "the identity of
 | |
| 1211 | another party who generated some data" (quoted from Neuman and Ts'o).*} | |
| 1212 | ||
| 1213 | text{*These guarantees don't assess whether two parties agree on
 | |
| 1214 | the same session key: sending a message containing a key | |
| 1215 | doesn't a priori state knowledge of the key.*} | |
| 1216 | ||
| 1217 | ||
| 1218 | text{*These didn't have existential form in version IV*}
 | |
| 1219 | lemma B_authenticates_A: | |
| 1220 | "\<lbrakk> Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<in> parts (spies evs); | |
| 1221 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1222 | \<in> parts (spies evs); | |
| 1223 | Key servK \<notin> analz (spies evs); | |
| 1224 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1225 | \<Longrightarrow> \<exists> ST. Says A B \<lbrace>ST, Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<rbrace> \<in> set evs" | |
| 1226 | apply (blast dest: servTicket_authentic_Tgs intro: Says_K5) | |
| 1227 | done | |
| 1228 | ||
| 1229 | text{*The second assumption tells B what kind of key servK is.*}
 | |
| 1230 | lemma B_authenticates_A_r: | |
| 1231 | "\<lbrakk> Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<in> parts (spies evs); | |
| 1232 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1233 | \<in> parts (spies evs); | |
| 1234 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1235 | \<in> parts (spies evs); | |
| 1236 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1237 | \<in> parts (spies evs); | |
| 1238 | \<not> expiredSK Ts evs; \<not> expiredAK Ta evs; | |
| 1239 | B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1240 | \<Longrightarrow> \<exists> ST. Says A B \<lbrace>ST, Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<rbrace> \<in> set evs" | |
| 1241 | apply (blast intro: Says_K5 dest: Confidentiality_B servTicket_authentic_Tgs) | |
| 1242 | done | |
| 1243 | ||
| 1244 | text{* @{text u_B_authenticates_A} would be the same as @{text B_authenticates_A} because the
 | |
| 1245 | servK confidentiality assumption is yet unrelaxed*} | |
| 1246 | ||
| 1247 | lemma u_B_authenticates_A_r: | |
| 1248 | "\<lbrakk> Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<in> parts (spies evs); | |
| 1249 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1250 | \<in> parts (spies evs); | |
| 1251 | \<not> expiredSK Ts evs; | |
| 1252 | B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1253 | \<Longrightarrow> \<exists> ST. Says A B \<lbrace>ST, Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<rbrace> \<in> set evs" | |
| 1254 | apply (blast intro: Says_K5 dest: u_Confidentiality_B servTicket_authentic_Tgs) | |
| 1255 | done | |
| 1256 | ||
| 1257 | lemma A_authenticates_B: | |
| 1258 | "\<lbrakk> Crypt servK (Number T3) \<in> parts (spies evs); | |
| 1259 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1260 | \<in> parts (spies evs); | |
| 1261 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1262 | \<in> parts (spies evs); | |
| 1263 | Key authK \<notin> analz (spies evs); Key servK \<notin> analz (spies evs); | |
| 1264 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1265 | \<Longrightarrow> Says B A (Crypt servK (Number T3)) \<in> set evs" | |
| 32404 | 1266 | by (metis authK_authentic Oops_range_spies1 Says_K6 servK_authentic u_K4_imp_K2 unique_authKeys) | 
| 18886 | 1267 | |
| 1268 | lemma A_authenticates_B_r: | |
| 1269 | "\<lbrakk> Crypt servK (Number T3) \<in> parts (spies evs); | |
| 1270 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1271 | \<in> parts (spies evs); | |
| 1272 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1273 | \<in> parts (spies evs); | |
| 1274 | \<not> expiredAK Ta evs; \<not> expiredSK Ts evs; | |
| 1275 | A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1276 | \<Longrightarrow> Says B A (Crypt servK (Number T3)) \<in> set evs" | |
| 1277 | apply (frule authK_authentic) | |
| 1278 | apply (erule_tac [3] exE) | |
| 1279 | apply (frule_tac [3] Says_Kas_message_form) | |
| 1280 | apply (frule_tac [4] Confidentiality_Kas) | |
| 1281 | apply (frule_tac [7] servK_authentic) | |
| 1282 | prefer 8 apply blast | |
| 1283 | apply (erule_tac [9] exE) | |
| 1284 | apply (erule_tac [9] exE) | |
| 1285 | apply (frule_tac [9] K4_imp_K2) | |
| 1286 | apply assumption+ | |
| 32404 | 1287 | apply (blast dest: Key_unique_SesKey intro!: Says_K6 dest: Confidentiality_Tgs) | 
| 18886 | 1288 | done | 
| 1289 | ||
| 1290 | ||
| 1291 | ||
| 1292 | ||
| 1293 | subsection{*Parties' knowledge of session keys. 
 | |
| 1294 | An agent knows a session key if he used it to issue a cipher. These | |
| 1295 | guarantees can be interpreted both in terms of key distribution | |
| 1296 | and of non-injective agreement on the session key.*} | |
| 1297 | ||
| 1298 | lemma Kas_Issues_A: | |
| 1299 | "\<lbrakk> Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace>, authTicket\<rbrace> \<in> set evs; | |
| 1300 | evs \<in> kerbV \<rbrakk> | |
| 1301 | \<Longrightarrow> Kas Issues A with (Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace>) | |
| 1302 | on evs" | |
| 1303 | apply (simp (no_asm) add: Issues_def) | |
| 1304 | apply (rule exI) | |
| 1305 | apply (rule conjI, assumption) | |
| 1306 | apply (simp (no_asm)) | |
| 1307 | apply (erule rev_mp) | |
| 1308 | apply (erule kerbV.induct) | |
| 1309 | apply (frule_tac [5] Says_ticket_parts) | |
| 1310 | apply (frule_tac [7] Says_ticket_parts) | |
| 1311 | apply (simp_all (no_asm_simp) add: all_conj_distrib) | |
| 1312 | txt{*K2*}
 | |
| 1313 | apply (simp add: takeWhile_tail) | |
| 1314 | apply (blast dest: authK_authentic parts_spies_takeWhile_mono [THEN subsetD] parts_spies_evs_revD2 [THEN subsetD]) | |
| 1315 | done | |
| 1316 | ||
| 1317 | lemma A_authenticates_and_keydist_to_Kas: | |
| 1318 | "\<lbrakk> Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace> \<in> parts (spies evs); | |
| 1319 | A \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1320 | \<Longrightarrow> Kas Issues A with (Crypt (shrK A) \<lbrace>Key authK, Peer, Ta\<rbrace>) | |
| 1321 | on evs" | |
| 1322 | by (blast dest!: authK_authentic Kas_Issues_A) | |
| 1323 | ||
| 1324 | lemma Tgs_Issues_A: | |
| 1325 | "\<lbrakk> Says Tgs A \<lbrace>Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>, servTicket\<rbrace> | |
| 1326 | \<in> set evs; | |
| 1327 | Key authK \<notin> analz (spies evs); evs \<in> kerbV \<rbrakk> | |
| 1328 | \<Longrightarrow> Tgs Issues A with | |
| 1329 | (Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>) on evs" | |
| 1330 | apply (simp (no_asm) add: Issues_def) | |
| 1331 | apply (rule exI) | |
| 1332 | apply (rule conjI, assumption) | |
| 1333 | apply (simp (no_asm)) | |
| 1334 | apply (erule rev_mp) | |
| 1335 | apply (erule rev_mp) | |
| 1336 | apply (erule kerbV.induct, analz_mono_contra) | |
| 1337 | apply (frule_tac [5] Says_ticket_parts) | |
| 1338 | apply (frule_tac [7] Says_ticket_parts) | |
| 1339 | apply (simp_all (no_asm_simp) add: all_conj_distrib) | |
| 1340 | apply (simp add: takeWhile_tail) | |
| 1341 | (*Last two thms installed only to derive authK \<notin> range shrK*) | |
| 1342 | apply (blast dest: servK_authentic parts_spies_takeWhile_mono [THEN subsetD] | |
| 1343 | parts_spies_evs_revD2 [THEN subsetD] authTicket_authentic | |
| 1344 | Says_Kas_message_form) | |
| 1345 | done | |
| 1346 | ||
| 1347 | lemma A_authenticates_and_keydist_to_Tgs: | |
| 1348 | "\<lbrakk> Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1349 | \<in> parts (spies evs); | |
| 1350 | Key authK \<notin> analz (spies evs); B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1351 | \<Longrightarrow> \<exists>A. Tgs Issues A with | |
| 1352 | (Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace>) on evs" | |
| 1353 | by (blast dest: Tgs_Issues_A servK_authentic_bis) | |
| 1354 | ||
| 1355 | lemma B_Issues_A: | |
| 1356 | "\<lbrakk> Says B A (Crypt servK (Number T3)) \<in> set evs; | |
| 1357 | Key servK \<notin> analz (spies evs); | |
| 1358 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1359 | \<Longrightarrow> B Issues A with (Crypt servK (Number T3)) on evs" | |
| 1360 | apply (simp (no_asm) add: Issues_def) | |
| 1361 | apply (rule exI) | |
| 1362 | apply (rule conjI, assumption) | |
| 1363 | apply (simp (no_asm)) | |
| 1364 | apply (erule rev_mp) | |
| 1365 | apply (erule rev_mp) | |
| 1366 | apply (erule kerbV.induct, analz_mono_contra) | |
| 1367 | apply (simp_all (no_asm_simp) add: all_conj_distrib) | |
| 1368 | apply blast | |
| 1369 | txt{*K6 requires numerous lemmas*}
 | |
| 1370 | apply (simp add: takeWhile_tail) | |
| 1371 | apply (blast intro: Says_K6 dest: servTicket_authentic | |
| 1372 | parts_spies_takeWhile_mono [THEN subsetD] | |
| 1373 | parts_spies_evs_revD2 [THEN subsetD]) | |
| 1374 | done | |
| 1375 | ||
| 1376 | lemma A_authenticates_and_keydist_to_B: | |
| 1377 | "\<lbrakk> Crypt servK (Number T3) \<in> parts (spies evs); | |
| 1378 | Crypt authK \<lbrace>Key servK, Agent B, Number Ts\<rbrace> | |
| 1379 | \<in> parts (spies evs); | |
| 1380 | Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta\<rbrace> | |
| 1381 | \<in> parts (spies evs); | |
| 1382 | Key authK \<notin> analz (spies evs); Key servK \<notin> analz (spies evs); | |
| 1383 | A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbV \<rbrakk> | |
| 1384 | \<Longrightarrow> B Issues A with (Crypt servK (Number T3)) on evs" | |
| 1385 | by (blast dest!: A_authenticates_B B_Issues_A) | |
| 1386 | ||
| 1387 | ||
| 1388 | (*Must use \<le> rather than =, otherwise it cannot be proved inductively!*) | |
| 1389 | (*This is too strong for version V but would hold for version IV if only B | |
| 1390 | in K6 said a fresh timestamp. | |
| 1391 | lemma honest_never_says_newer_timestamp: | |
| 1392 |      "\<lbrakk> (CT evs) \<le> T ; Number T \<in> parts {X}; evs \<in> kerbV \<rbrakk> 
 | |
| 1393 | \<Longrightarrow> \<forall> A B. A \<noteq> Spy \<longrightarrow> Says A B X \<notin> set evs" | |
| 1394 | apply (erule rev_mp) | |
| 1395 | apply (erule kerbV.induct) | |
| 1396 | apply (simp_all) | |
| 1397 | apply force | |
| 1398 | apply force | |
| 1399 | txt{*clarifying case K3*}
 | |
| 1400 | apply (rule impI) | |
| 1401 | apply (rule impI) | |
| 1402 | apply (frule Suc_leD) | |
| 1403 | apply (clarify) | |
| 1404 | txt{*cannot solve K3 or K5 because the spy might send CT evs as authTicket
 | |
| 1405 | or servTicket, which the honest agent would forward*} | |
| 1406 | prefer 2 apply force | |
| 1407 | prefer 4 apply force | |
| 1408 | prefer 4 apply force | |
| 1409 | txt{*cannot solve K6 unless B updates the timestamp - rather than bouncing T3*}
 | |
| 1410 | oops | |
| 1411 | *) | |
| 1412 | ||
| 1413 | ||
| 1414 | text{*But can prove a less general fact conerning only authenticators!*}
 | |
| 1415 | lemma honest_never_says_newer_timestamp_in_auth: | |
| 1416 |      "\<lbrakk> (CT evs) \<le> T; Number T \<in> parts {X}; A \<notin> bad; evs \<in> kerbV \<rbrakk> 
 | |
| 1417 | \<Longrightarrow> Says A B \<lbrace>Y, X\<rbrace> \<notin> set evs" | |
| 1418 | apply (erule rev_mp) | |
| 1419 | apply (erule kerbV.induct) | |
| 1420 | apply (simp_all) | |
| 1421 | apply force+ | |
| 1422 | done | |
| 1423 | ||
| 1424 | lemma honest_never_says_current_timestamp_in_auth: | |
| 1425 |      "\<lbrakk> (CT evs) = T; Number T \<in> parts {X}; A \<notin> bad; evs \<in> kerbV \<rbrakk> 
 | |
| 1426 | \<Longrightarrow> Says A B \<lbrace>Y, X\<rbrace> \<notin> set evs" | |
| 1427 | apply (frule eq_imp_le) | |
| 1428 | apply (blast dest: honest_never_says_newer_timestamp_in_auth) | |
| 1429 | done | |
| 1430 | ||
| 1431 | ||
| 1432 | ||
| 1433 | lemma A_Issues_B: | |
| 1434 | "\<lbrakk> Says A B \<lbrace>ST, Crypt servK \<lbrace>Agent A, Number T3\<rbrace>\<rbrace> \<in> set evs; | |
| 1435 | Key servK \<notin> analz (spies evs); | |
| 1436 | B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1437 | \<Longrightarrow> A Issues B with (Crypt servK \<lbrace>Agent A, Number T3\<rbrace>) on evs" | |
| 1438 | apply (simp (no_asm) add: Issues_def) | |
| 1439 | apply (rule exI) | |
| 1440 | apply (rule conjI, assumption) | |
| 1441 | apply (simp (no_asm)) | |
| 1442 | apply (erule rev_mp) | |
| 1443 | apply (erule rev_mp) | |
| 1444 | apply (erule kerbV.induct, analz_mono_contra) | |
| 1445 | apply (frule_tac [7] Says_ticket_parts) | |
| 1446 | apply (frule_tac [5] Says_ticket_parts) | |
| 1447 | apply (simp_all (no_asm_simp)) | |
| 1448 | txt{*K5*}
 | |
| 1449 | apply auto | |
| 1450 | apply (simp add: takeWhile_tail) | |
| 1451 | txt{*Level 15: case study necessary because the assumption doesn't state
 | |
| 1452 | the form of servTicket. The guarantee becomes stronger.*} | |
| 1453 | prefer 2 apply (simp add: takeWhile_tail) | |
| 1454 | (**This single command of version IV... | |
| 1455 | apply (blast dest: Says_imp_spies [THEN analz.Inj, THEN analz_Decrypt'] | |
| 1456 | K3_imp_K2 K4_trustworthy' | |
| 1457 | parts_spies_takeWhile_mono [THEN subsetD] | |
| 1458 | parts_spies_evs_revD2 [THEN subsetD] | |
| 1459 | intro: Says_Auth) | |
| 1460 | ...expands as follows - including extra exE because of new form of lemmas*) | |
| 1461 | apply (frule K3_imp_K2, assumption, assumption, erule exE, erule exE) | |
| 1462 | apply (case_tac "Key authK \<in> analz (spies evs5)") | |
| 32404 | 1463 | apply (metis Says_imp_analz_Spy analz.Fst analz_Decrypt') | 
| 18886 | 1464 | apply (frule K3_imp_K2, assumption, assumption, erule exE, erule exE) | 
| 1465 | apply (drule Says_imp_knows_Spy [THEN parts.Inj, THEN parts.Fst]) | |
| 1466 | apply (frule servK_authentic_ter, blast, assumption+) | |
| 1467 | apply (drule parts_spies_takeWhile_mono [THEN subsetD]) | |
| 1468 | apply (drule parts_spies_evs_revD2 [THEN subsetD]) | |
| 1469 | txt{* @{term Says_K5} closes the proof in version IV because it is clear which 
 | |
| 1470 | servTicket an authenticator appears with in msg 5. In version V an authenticator can appear with any item that the spy could replace the servTicket with*} | |
| 1471 | apply (frule Says_K5, blast, assumption, assumption, assumption, assumption, erule exE) | |
| 1472 | txt{*We need to state that an honest agent wouldn't send the wrong timestamp
 | |
| 1473 | within an authenticator, wathever it is paired with*} | |
| 1474 | apply (simp add: honest_never_says_current_timestamp_in_auth) | |
| 1475 | done | |
| 1476 | ||
| 1477 | lemma B_authenticates_and_keydist_to_A: | |
| 1478 | "\<lbrakk> Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<in> parts (spies evs); | |
| 1479 | Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> | |
| 1480 | \<in> parts (spies evs); | |
| 1481 | Key servK \<notin> analz (spies evs); | |
| 1482 | B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbV \<rbrakk> | |
| 1483 | \<Longrightarrow> A Issues B with (Crypt servK \<lbrace>Agent A, Number T3\<rbrace>) on evs" | |
| 1484 | by (blast dest: B_authenticates_A A_Issues_B) | |
| 1485 | ||
| 1486 | ||
| 1487 | ||
| 1488 | subsection{*
 | |
| 1489 | Novel guarantees, never studied before. Because honest agents always say | |
| 1490 | the right timestamp in authenticators, we can prove unicity guarantees based | |
| 1491 | exactly on timestamps. Classical unicity guarantees are based on nonces. | |
| 1492 | Of course assuming the agent to be different from the Spy, rather than not in | |
| 1493 | bad, would suffice below. Similar guarantees must also hold of | |
| 1494 | Kerberos IV.*} | |
| 1495 | ||
| 1496 | text{*Notice that an honest agent can send the same timestamp on two
 | |
| 1497 | different traces of the same length, but not on the same trace!*} | |
| 1498 | ||
| 1499 | lemma unique_timestamp_authenticator1: | |
| 1500 | "\<lbrakk> Says A Kas \<lbrace>Agent A, Agent Tgs, Number T1\<rbrace> \<in> set evs; | |
| 1501 | Says A Kas' \<lbrace>Agent A, Agent Tgs', Number T1\<rbrace> \<in> set evs; | |
| 1502 | A \<notin>bad; evs \<in> kerbV \<rbrakk> | |
| 1503 | \<Longrightarrow> Kas=Kas' \<and> Tgs=Tgs'" | |
| 1504 | apply (erule rev_mp, erule rev_mp) | |
| 1505 | apply (erule kerbV.induct) | |
| 1506 | apply (simp_all, blast) | |
| 1507 | apply auto | |
| 1508 | apply (simp_all add: honest_never_says_current_timestamp_in_auth) | |
| 1509 | done | |
| 1510 | ||
| 1511 | lemma unique_timestamp_authenticator2: | |
| 1512 | "\<lbrakk> Says A Tgs \<lbrace>AT, Crypt AK \<lbrace>Agent A, Number T2\<rbrace>, Agent B\<rbrace> \<in> set evs; | |
| 1513 | Says A Tgs' \<lbrace>AT', Crypt AK' \<lbrace>Agent A, Number T2\<rbrace>, Agent B'\<rbrace> \<in> set evs; | |
| 1514 | A \<notin>bad; evs \<in> kerbV \<rbrakk> | |
| 1515 | \<Longrightarrow> Tgs=Tgs' \<and> AT=AT' \<and> AK=AK' \<and> B=B'" | |
| 1516 | apply (erule rev_mp, erule rev_mp) | |
| 1517 | apply (erule kerbV.induct) | |
| 1518 | apply (simp_all, blast) | |
| 1519 | apply auto | |
| 1520 | apply (simp_all add: honest_never_says_current_timestamp_in_auth) | |
| 1521 | done | |
| 1522 | ||
| 1523 | lemma unique_timestamp_authenticator3: | |
| 1524 | "\<lbrakk> Says A B \<lbrace>ST, Crypt SK \<lbrace>Agent A, Number T\<rbrace>\<rbrace> \<in> set evs; | |
| 1525 | Says A B' \<lbrace>ST', Crypt SK' \<lbrace>Agent A, Number T\<rbrace>\<rbrace> \<in> set evs; | |
| 1526 | A \<notin>bad; evs \<in> kerbV \<rbrakk> | |
| 1527 | \<Longrightarrow> B=B' \<and> ST=ST' \<and> SK=SK'" | |
| 1528 | apply (erule rev_mp, erule rev_mp) | |
| 1529 | apply (erule kerbV.induct) | |
| 1530 | apply (simp_all, blast) | |
| 1531 | apply (auto simp add: honest_never_says_current_timestamp_in_auth) | |
| 1532 | done | |
| 1533 | ||
| 1534 | text{*The second part of the message is treated as an authenticator by the last
 | |
| 1535 | simplification step, even if it is not an authenticator!*} | |
| 1536 | lemma unique_timestamp_authticket: | |
| 1537 | "\<lbrakk> Says Kas A \<lbrace>X, Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key AK, T\<rbrace>\<rbrace> \<in> set evs; | |
| 1538 | Says Kas A' \<lbrace>X', Crypt (shrK Tgs') \<lbrace>Agent A', Agent Tgs', Key AK', T\<rbrace>\<rbrace> \<in> set evs; | |
| 1539 | evs \<in> kerbV \<rbrakk> | |
| 1540 | \<Longrightarrow> A=A' \<and> X=X' \<and> Tgs=Tgs' \<and> AK=AK'" | |
| 1541 | apply (erule rev_mp, erule rev_mp) | |
| 1542 | apply (erule kerbV.induct) | |
| 1543 | apply (auto simp add: honest_never_says_current_timestamp_in_auth) | |
| 1544 | done | |
| 1545 | ||
| 1546 | text{*The second part of the message is treated as an authenticator by the last
 | |
| 1547 | simplification step, even if it is not an authenticator!*} | |
| 1548 | lemma unique_timestamp_servticket: | |
| 1549 | "\<lbrakk> Says Tgs A \<lbrace>X, Crypt (shrK B) \<lbrace>Agent A, Agent B, Key SK, T\<rbrace>\<rbrace> \<in> set evs; | |
| 1550 | Says Tgs A' \<lbrace>X', Crypt (shrK B') \<lbrace>Agent A', Agent B', Key SK', T\<rbrace>\<rbrace> \<in> set evs; | |
| 1551 | evs \<in> kerbV \<rbrakk> | |
| 1552 | \<Longrightarrow> A=A' \<and> X=X' \<and> B=B' \<and> SK=SK'" | |
| 1553 | apply (erule rev_mp, erule rev_mp) | |
| 1554 | apply (erule kerbV.induct) | |
| 1555 | apply (auto simp add: honest_never_says_current_timestamp_in_auth) | |
| 1556 | done | |
| 1557 | ||
| 1558 | (*Uses assumption K6's assumption that B \<noteq> Kas, otherwise B should say | |
| 1559 | fresh timestamp*) | |
| 1560 | lemma Kas_never_says_newer_timestamp: | |
| 1561 |      "\<lbrakk> (CT evs) \<le> T; Number T \<in> parts {X}; evs \<in> kerbV \<rbrakk> 
 | |
| 1562 | \<Longrightarrow> \<forall> A. Says Kas A X \<notin> set evs" | |
| 1563 | apply (erule rev_mp) | |
| 1564 | apply (erule kerbV.induct, auto) | |
| 1565 | done | |
| 1566 | ||
| 1567 | lemma Kas_never_says_current_timestamp: | |
| 1568 |      "\<lbrakk> (CT evs) = T; Number T \<in> parts {X}; evs \<in> kerbV \<rbrakk> 
 | |
| 1569 | \<Longrightarrow> \<forall> A. Says Kas A X \<notin> set evs" | |
| 1570 | apply (frule eq_imp_le) | |
| 1571 | apply (blast dest: Kas_never_says_newer_timestamp) | |
| 1572 | done | |
| 1573 | ||
| 1574 | lemma unique_timestamp_msg2: | |
| 1575 | "\<lbrakk> Says Kas A \<lbrace>Crypt (shrK A) \<lbrace>Key AK, Agent Tgs, T\<rbrace>, AT\<rbrace> \<in> set evs; | |
| 1576 | Says Kas A' \<lbrace>Crypt (shrK A') \<lbrace>Key AK', Agent Tgs', T\<rbrace>, AT'\<rbrace> \<in> set evs; | |
| 1577 | evs \<in> kerbV \<rbrakk> | |
| 1578 | \<Longrightarrow> A=A' \<and> AK=AK' \<and> Tgs=Tgs' \<and> AT=AT'" | |
| 1579 | apply (erule rev_mp, erule rev_mp) | |
| 1580 | apply (erule kerbV.induct) | |
| 1581 | apply (auto simp add: Kas_never_says_current_timestamp) | |
| 1582 | done | |
| 1583 | ||
| 1584 | (*Uses assumption K6's assumption that B \<noteq> Tgs, otherwise B should say | |
| 1585 | fresh timestamp*) | |
| 1586 | lemma Tgs_never_says_newer_timestamp: | |
| 1587 |      "\<lbrakk> (CT evs) \<le> T; Number T \<in> parts {X}; evs \<in> kerbV \<rbrakk> 
 | |
| 1588 | \<Longrightarrow> \<forall> A. Says Tgs A X \<notin> set evs" | |
| 1589 | apply (erule rev_mp) | |
| 1590 | apply (erule kerbV.induct, auto) | |
| 1591 | done | |
| 1592 | ||
| 1593 | lemma Tgs_never_says_current_timestamp: | |
| 1594 |      "\<lbrakk> (CT evs) = T; Number T \<in> parts {X}; evs \<in> kerbV \<rbrakk> 
 | |
| 1595 | \<Longrightarrow> \<forall> A. Says Tgs A X \<notin> set evs" | |
| 1596 | apply (frule eq_imp_le) | |
| 1597 | apply (blast dest: Tgs_never_says_newer_timestamp) | |
| 1598 | done | |
| 1599 | ||
| 1600 | ||
| 1601 | lemma unique_timestamp_msg4: | |
| 1602 | "\<lbrakk> Says Tgs A \<lbrace>Crypt (shrK A) \<lbrace>Key SK, Agent B, T\<rbrace>, ST\<rbrace> \<in> set evs; | |
| 1603 | Says Tgs A' \<lbrace>Crypt (shrK A') \<lbrace>Key SK', Agent B', T\<rbrace>, ST'\<rbrace> \<in> set evs; | |
| 1604 | evs \<in> kerbV \<rbrakk> | |
| 1605 | \<Longrightarrow> A=A' \<and> SK=SK' \<and> B=B' \<and> ST=ST'" | |
| 1606 | apply (erule rev_mp, erule rev_mp) | |
| 1607 | apply (erule kerbV.induct) | |
| 1608 | apply (auto simp add: Tgs_never_says_current_timestamp) | |
| 1609 | done | |
| 1610 | ||
| 1611 | end |