2023-12-01 17:55:41 +00:00
%%% Preamble
\documentclass [11pt, a4paper] { article}
\usepackage [english] { babel} % English language/hyphenation
\usepackage { url}
\usepackage { tabularx}
\usepackage { pdfpages}
\usepackage { float}
\usepackage { amsmath, amssymb}
\usepackage { systeme}
\usepackage { graphicx}
\graphicspath { { ../images for report/} }
\usepackage [margin=2cm] { geometry}
\usepackage { hyperref}
\hypersetup {
colorlinks,
citecolor=black,
filecolor=black,
linkcolor=black,
urlcolor=black
}
\usepackage { cleveref}
%%% Custom headers/footers (fancyhdr package)
\usepackage { fancyhdr}
\pagestyle { fancyplain}
\fancyhead { } % No page header
\fancyfoot [L] { } % Empty
\fancyfoot [C] { \thepage } % Pagenumbering
\fancyfoot [R] { } % Empty
\renewcommand { \headrulewidth } { 0pt} % Remove header underlines
\renewcommand { \footrulewidth } { 0pt} % Remove footer underlines
\setlength { \headheight } { 13.6pt}
% numeric
\usepackage [style=ieee,sorting=none,backend=biber] { biblatex}
\addbibresource { ../main.bib}
% Write the approved title of your dissertation
\title { Automated image classification with expandable models}
% Write your full name, as in University records
\author { Andre Henriques, 6644818}
\date { }
%%% Begin document
\begin { document}
\section * { 1}
\subsection * { 1.1}
2023-12-01 18:08:08 +00:00
The file ag01598\_ 6644818\_ 1.1.spdl contains the base model of $ \text { protocol } \Pi $ .
2023-12-01 17:55:41 +00:00
I choose the names of the roles based on their functions since it would make the file more readable so R is Phone, S is Application, N is Network.
As the diagram shows the first message is sent from the phone do the network to request the generation of a new session key.
2023-12-01 18:13:07 +00:00
The keys where modeled using a custom usertype called ``SessionKey'' and the time to live has modeled using a custom usertype called ``Timestamp''
2023-12-01 17:55:41 +00:00
2023-12-01 18:13:07 +00:00
The Network then aswers to the Phone and the Application the keys and the time to live and the hashed value of that using a hash function named ``Mac''.
2023-12-01 17:55:41 +00:00
The Phone and the Application verify the Mac and then the phone sends a nonce to the phone and the phone answers back with a new nonce and the original nonce.
\end { document}