2006-11-21 13:40:50 +00:00
|
|
|
/*
|
|
|
|
* Needham-Schroeder protocol
|
|
|
|
*/
|
|
|
|
|
|
|
|
// PKI infrastructure
|
|
|
|
|
|
|
|
const pk: Function;
|
|
|
|
secret sk: Function;
|
|
|
|
inversekeys (pk,sk);
|
|
|
|
|
|
|
|
// The protocol description
|
|
|
|
|
|
|
|
protocol ns3(I,R)
|
|
|
|
{
|
|
|
|
role I
|
|
|
|
{
|
2012-05-02 22:01:08 +01:00
|
|
|
fresh ni: Nonce;
|
2006-11-21 13:40:50 +00:00
|
|
|
var nr: Nonce;
|
|
|
|
|
|
|
|
send_1(I,R, {I,ni}pk(R) );
|
2012-05-02 22:26:41 +01:00
|
|
|
recv_2(R,I, {ni,nr}pk(I) );
|
2006-11-21 13:40:50 +00:00
|
|
|
send_3(I,R, {nr}pk(R) );
|
|
|
|
claim_i1(I,Secret,ni);
|
|
|
|
claim_i2(I,Secret,nr);
|
|
|
|
claim_i3(I,Niagree);
|
|
|
|
claim_i4(I,Nisynch);
|
|
|
|
}
|
|
|
|
|
|
|
|
role R
|
|
|
|
{
|
|
|
|
var ni: Nonce;
|
2012-05-02 22:01:08 +01:00
|
|
|
fresh nr: Nonce;
|
2006-11-21 13:40:50 +00:00
|
|
|
|
2012-05-02 22:26:41 +01:00
|
|
|
recv_1(I,R, {I,ni}pk(R) );
|
2006-11-21 13:40:50 +00:00
|
|
|
send_2(R,I, {ni,nr}pk(I) );
|
2012-05-02 22:26:41 +01:00
|
|
|
recv_3(I,R, {nr}pk(R) );
|
2006-11-21 13:40:50 +00:00
|
|
|
claim_r1(R,Secret,ni);
|
|
|
|
claim_r2(R,Secret,nr);
|
|
|
|
claim_r3(R,Niagree);
|
|
|
|
claim_r4(R,Nisynch);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The agents in the system
|
|
|
|
|
|
|
|
|
|
|
|
// An untrusted agent, with leaked information
|
|
|
|
|
|
|
|
|
|
|
|
// The runs (only needed for the modelchecker algorithm)
|
|
|
|
|
|
|
|
|