Auth--The Inductive Approach to Verifying Security Protocols
Cryptographic protocols are of major importance, especially with the
growing use of the Internet. This directory demonstrates a new
proof method. The operational semantics of protocol participants is
defined inductively. The directory contains proofs concerning
- three versions of the Otway-Rees protocol
- the Needham-Schroeder protocol (public-key and shared-key versions)
- the Kerberos protocol (the simplified form published in the BAN paper)
- three versions of the Yahalom protocol, including a bad one that
illustrates the purpose of the Oops rule
- a novel recursive authentication protocol
- the Internet protocol TLS
Last modified 30 Jan 1998
lcp@cl.cam.ac.uk