scyther/spdl/ns3.spdl

68 lines
1.1 KiB
Plaintext
Raw Normal View History

2005-04-15 14:07:57 +01:00
/*
* Needham-Schroeder protocol
*/
// PKI infrastructure
2004-02-20 11:37:28 +00:00
const pk: Function;
secret sk: Function;
inversekeys (pk,sk);
2005-04-15 14:07:57 +01:00
// The protocol description
2004-02-20 11:37:28 +00:00
protocol ns3(I,R)
{
role I
{
const ni: Nonce;
var nr: Nonce;
send_1(I,R, {I,ni}pk(R) );
read_2(R,I, {ni,nr}pk(I) );
send_3(I,R, {nr}pk(R) );
2005-02-19 14:25:30 +00:00
claim_i1(I,Secret,ni);
claim_i2(I,Secret,nr);
claim_i3(I,Niagree);
claim_i4(I,Nisynch);
2004-02-20 11:37:28 +00:00
}
role R
{
var ni: Nonce;
const nr: Nonce;
read_1(I,R, {I,ni}pk(R) );
send_2(R,I, {ni,nr}pk(I) );
read_3(I,R, {nr}pk(R) );
2005-02-19 14:25:30 +00:00
claim_r1(R,Secret,ni);
claim_r2(R,Secret,nr);
claim_r3(R,Niagree);
claim_r4(R,Nisynch);
2004-02-20 11:37:28 +00:00
}
}
2005-04-15 14:07:57 +01:00
// The agents in the system
const Alice,Bob: Agent;
2004-02-20 11:37:28 +00:00
2005-04-15 14:07:57 +01:00
// An untrusted agent, with leaked information
const Eve: Agent;
2004-02-20 11:37:28 +00:00
untrusted Eve;
2004-11-18 13:15:19 +00:00
const ne: Nonce;
2004-02-20 11:37:28 +00:00
compromised sk(Eve);
2005-04-15 14:07:57 +01:00
// The runs (only needed for the modelchecker algorithm)
2004-11-18 13:15:19 +00:00
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);
2005-04-21 13:13:04 +01:00
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);
2005-04-15 14:07:57 +01:00