<!-- $Id$ -->
<HTML><HEAD><TITLE>HOL/Auth/README</TITLE></HEAD><BODY>
<H2>Auth--The Inductive Approach to Verifying Security Protocols</H2>
<P>Cryptographic protocols are of major importance, especially with the
growing use of the Internet. This directory demonstrates a <A
HREF="http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html">new
proof method</A>. The operational semantics of protocol participants is
defined inductively. The directory contains proofs concerning
<UL>
<LI>three versions of the Otway-Rees protocol
<LI>the Needham-Schroeder protocol (public-key and shared-key versions)
<LI>two versions of the Yahalom protocol
<LI>a novel recursive authentication protocol
<LI>the Internet protocol TLS
</UL>
<HR>
<P>Last modified 30 Jan 1998
<ADDRESS>
<A NAME="lcp@cl.cam.ac.uk" HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A>
</ADDRESS>
</BODY></HTML>