scyther/testing/f5.spdl

39 lines
503 B
Plaintext
Raw Permalink Normal View History

2006-11-21 13:40:50 +00:00
/*
* f5.spdl
*
* Tailored protocol to show that any number of runs can be required to
* find an attack.
*
* For this version, -m2 and -r5 are needed.
*
* April 2005, Cas Cremers
*/
const pk: Function;
secret sk: Function;
inversekeys (pk,sk);
protocol f5(I,R)
2006-11-21 13:40:50 +00:00
{
role I
{
var nr: Nonce;
2012-05-02 22:26:41 +01:00
recv_!1(R,I, nr );
send_!2(I,R, { nr }sk(I) );
2012-05-02 22:26:41 +01:00
recv_!3(R,I, {{{{{ nr }sk(R)}sk(R)}sk(R)}sk(R)}sk(R) );
2006-11-21 13:40:50 +00:00
claim_i1(I,Reachable);
2006-11-21 13:40:50 +00:00
}
role R
{
fresh nr: Nonce;
send_!1(R,I, nr );
2006-11-21 13:40:50 +00:00
}
}