# HG changeset patch # User paulson # Date 988187499 -7200 # Node ID 4095353bd0d7fd95f8c4720796dad9c26e4c1eaa # Parent a8b8d59899fd896218d188b9545ba7b162b00c16 changes specifically for the book version diff -r a8b8d59899fd -r 4095353bd0d7 doc-src/TutorialI/Protocol/NS_Public.thy --- a/doc-src/TutorialI/Protocol/NS_Public.thy Tue Apr 24 17:55:06 2001 +0200 +++ b/doc-src/TutorialI/Protocol/NS_Public.thy Wed Apr 25 10:31:39 2001 +0200 @@ -12,14 +12,14 @@ consts ns_public :: "event list set" inductive ns_public - intros + intros (*Initial trace is empty*) Nil: "[] \ ns_public" (*The spy MAY say anything he CAN say. We do not expect him to invent new nonces here, but he can also use NS1. Common to all similar protocols.*) - Fake: "\evs \ ns_public; X \ synth (analz (spies evs))\ + Fake: "\evs \ ns_public; X \ synth (analz (knows Spy evs))\ \ Says Spy B X # evs \ ns_public" (*Alice initiates a protocol run, sending a nonce to Bob*) @@ -48,23 +48,23 @@ (*A "possibility property": there are traces that reach the end*) lemma "\NB. \evs \ ns_public. Says A B (Crypt (pubK B) (Nonce NB)) \ set evs" apply (intro exI bexI) -apply (rule_tac [2] ns_public.Nil [THEN ns_public.NS1, THEN ns_public.NS2, +apply (rule_tac [2] ns_public.Nil [THEN ns_public.NS1, THEN ns_public.NS2, THEN ns_public.NS3]) by possibility (**** Inductive proofs about ns_public ****) -(** Theorems of the form X \ parts (spies evs) imply that NOBODY +(** Theorems of the form X \ parts (knows Spy evs) imply that NOBODY sends messages containing X! **) (*Spy never sees another agent's private key! (unless it's bad at start)*) -lemma Spy_see_priK [simp]: - "evs \ ns_public \ (Key (priK A) \ parts (spies evs)) = (A \ bad)" +lemma Spy_see_priK [simp]: + "evs \ ns_public \ (Key (priK A) \ parts (knows Spy evs)) = (A \ bad)" by (erule ns_public.induct, auto) -lemma Spy_analz_priK [simp]: - "evs \ ns_public \ (Key (priK A) \ analz (spies evs)) = (A \ bad)" +lemma Spy_analz_priK [simp]: + "evs \ ns_public \ (Key (priK A) \ analz (knows Spy evs)) = (A \ bad)" by auto @@ -73,22 +73,23 @@ (*It is impossible to re-use a nonce in both NS1 and NS2, provided the nonce is secret. (Honest users generate fresh nonces.)*) -lemma no_nonce_NS1_NS2 [rule_format]: - "evs \ ns_public - \ Crypt (pubK C) \NA', Nonce NA, Agent D\ \ parts (spies evs) \ - Crypt (pubK B) \Nonce NA, Agent A\ \ parts (spies evs) \ - Nonce NA \ analz (spies evs)" +lemma no_nonce_NS1_NS2: + "\Crypt (pubK C) \NA', Nonce NA, Agent D\ \ parts (knows Spy evs); + Crypt (pubK B) \Nonce NA, Agent A\ \ parts (knows Spy evs); + evs \ ns_public\ + \ Nonce NA \ analz (knows Spy evs)" +apply (erule rev_mp, erule rev_mp) apply (erule ns_public.induct, simp_all) apply (blast intro: analz_insertI)+ done (*Unicity for NS1: nonce NA identifies agents A and B*) -lemma unique_NA: - "\Crypt(pubK B) \Nonce NA, Agent A \ \ parts(spies evs); - Crypt(pubK B') \Nonce NA, Agent A'\ \ parts(spies evs); - Nonce NA \ analz (spies evs); evs \ ns_public\ +lemma unique_NA: + "\Crypt(pubK B) \Nonce NA, Agent A \ \ parts(knows Spy evs); + Crypt(pubK B') \Nonce NA, Agent A'\ \ parts(knows Spy evs); + Nonce NA \ analz (knows Spy evs); evs \ ns_public\ \ A=A' \ B=B'" -apply (erule rev_mp, erule rev_mp, erule rev_mp) +apply (erule rev_mp, erule rev_mp, erule rev_mp) apply (erule ns_public.induct, simp_all) (*Fake, NS1*) apply (blast intro: analz_insertI)+ @@ -98,11 +99,11 @@ (*Secrecy: Spy does not see the nonce sent in msg NS1 if A and B are secure The major premise "Says A B ..." makes it a dest-rule, so we use (erule rev_mp) rather than rule_format. *) -theorem Spy_not_see_NA: +theorem Spy_not_see_NA: "\Says A B (Crypt(pubK B) \Nonce NA, Agent A\) \ set evs; - A \ bad; B \ bad; evs \ ns_public\ - \ Nonce NA \ analz (spies evs)" -apply (erule rev_mp) + A \ bad; B \ bad; evs \ ns_public\ + \ Nonce NA \ analz (knows Spy evs)" +apply (erule rev_mp) apply (erule ns_public.induct, simp_all) apply spy_analz apply (blast dest: unique_NA intro: no_nonce_NS1_NS2)+ @@ -111,9 +112,9 @@ (*Authentication for A: if she receives message 2 and has used NA to start a run, then B has sent message 2.*) -lemma A_trusts_NS2_lemma [rule_format]: - "\A \ bad; B \ bad; evs \ ns_public\ - \ Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\ \ parts (spies evs) \ +lemma A_trusts_NS2_lemma [rule_format]: + "\A \ bad; B \ bad; evs \ ns_public\ + \ Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\ \ parts (knows Spy evs) \ Says A B (Crypt(pubK B) \Nonce NA, Agent A\) \ set evs \ Says B A (Crypt(pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs" apply (erule ns_public.induct, simp_all) @@ -121,19 +122,19 @@ apply (blast dest: Spy_not_see_NA)+ done -theorem A_trusts_NS2: - "\Says A B (Crypt(pubK B) \Nonce NA, Agent A\) \ set evs; +theorem A_trusts_NS2: + "\Says A B (Crypt(pubK B) \Nonce NA, Agent A\) \ set evs; Says B' A (Crypt(pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs; - A \ bad; B \ bad; evs \ ns_public\ + A \ bad; B \ bad; evs \ ns_public\ \ Says B A (Crypt(pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs" by (blast intro: A_trusts_NS2_lemma) (*If the encrypted message appears then it originated with Alice in NS1*) lemma B_trusts_NS1 [rule_format]: - "evs \ ns_public - \ Crypt (pubK B) \Nonce NA, Agent A\ \ parts (spies evs) \ - Nonce NA \ analz (spies evs) \ + "evs \ ns_public + \ Crypt (pubK B) \Nonce NA, Agent A\ \ parts (knows Spy evs) \ + Nonce NA \ analz (knows Spy evs) \ Says A B (Crypt (pubK B) \Nonce NA, Agent A\) \ set evs" apply (erule ns_public.induct, simp_all) (*Fake*) @@ -144,27 +145,33 @@ (*** Authenticity properties obtained from NS2 ***) -(*Unicity for NS2: nonce NB identifies nonce NA and agents A, B +(*Unicity for NS2: nonce NB identifies nonce NA and agents A, B [unicity of B makes Lowe's fix work] [proof closely follows that for unique_NA] *) -lemma unique_NB [dest]: - "\Crypt(pubK A) \Nonce NA, Nonce NB, Agent B\ \ parts(spies evs); - Crypt(pubK A') \Nonce NA', Nonce NB, Agent B'\ \ parts(spies evs); - Nonce NB \ analz (spies evs); evs \ ns_public\ +lemma unique_NB [dest]: + "\Crypt(pubK A) \Nonce NA, Nonce NB, Agent B\ \ parts(knows Spy evs); + Crypt(pubK A') \Nonce NA', Nonce NB, Agent B'\ \ parts(knows Spy evs); + Nonce NB \ analz (knows Spy evs); evs \ ns_public\ \ A=A' \ NA=NA' \ B=B'" -apply (erule rev_mp, erule rev_mp, erule rev_mp) +apply (erule rev_mp, erule rev_mp, erule rev_mp) apply (erule ns_public.induct, simp_all) (*Fake, NS2*) apply (blast intro: analz_insertI)+ done + +text{* +@{thm[display] analz_Crypt_if[no_vars]} +\rulename{analz_Crypt_if} +*} + (*Secrecy: Spy does not see the nonce sent in msg NS2 if A and B are secure*) theorem Spy_not_see_NB [dest]: "\Says B A (Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs; A \ bad; B \ bad; evs \ ns_public\ - \ Nonce NB \ analz (spies evs)" + \ Nonce NB \ analz (knows Spy evs)" apply (erule rev_mp) apply (erule ns_public.induct, simp_all) apply spy_analz @@ -176,15 +183,15 @@ in message 2, then A has sent message 3.*) lemma B_trusts_NS3_lemma [rule_format]: "\A \ bad; B \ bad; evs \ ns_public\ \ - Crypt (pubK B) (Nonce NB) \ parts (spies evs) \ + Crypt (pubK B) (Nonce NB) \ parts (knows Spy evs) \ Says B A (Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs \ Says A B (Crypt (pubK B) (Nonce NB)) \ set evs" by (erule ns_public.induct, auto) theorem B_trusts_NS3: "\Says B A (Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs; - Says A' B (Crypt (pubK B) (Nonce NB)) \ set evs; - A \ bad; B \ bad; evs \ ns_public\ + Says A' B (Crypt (pubK B) (Nonce NB)) \ set evs; + A \ bad; B \ bad; evs \ ns_public\ \ Says A B (Crypt (pubK B) (Nonce NB)) \ set evs" by (blast intro: B_trusts_NS3_lemma) @@ -195,7 +202,7 @@ NA, then A initiated the run using NA.*) theorem B_trusts_protocol: "\A \ bad; B \ bad; evs \ ns_public\ \ - Crypt (pubK B) (Nonce NB) \ parts (spies evs) \ + Crypt (pubK B) (Nonce NB) \ parts (knows Spy evs) \ Says B A (Crypt (pubK A) \Nonce NA, Nonce NB, Agent B\) \ set evs \ Says A B (Crypt (pubK B) \Nonce NA, Agent A\) \ set evs" by (erule ns_public.induct, auto)