60 lines
1.1 KiB
Plaintext
60 lines
1.1 KiB
Plaintext
|
/*
|
||
|
Bilateral Key Exchange with Public Key protocol (BKEPK)
|
||
|
|
||
|
Version from Corin/Etalle: An Improved Constraint-Based System for the Verification of Security Protocols.
|
||
|
Tried to stay as close as possible to compare timing results.
|
||
|
*/
|
||
|
|
||
|
const pk,hash: Function;
|
||
|
secret sk: Function;
|
||
|
|
||
|
inversekeys (pk,sk);
|
||
|
|
||
|
protocol bkepk(A,B,testnonce)
|
||
|
{
|
||
|
role B
|
||
|
{
|
||
|
const nb: Nonce;
|
||
|
var na: Nonce;
|
||
|
var kab: Key;
|
||
|
|
||
|
send_1 (B,A, B,{ nb,B }pk(A) );
|
||
|
read_2 (A,B, { hash(nb),na,A,kab }pk(B) );
|
||
|
send_3 (B,A, { hash(na) }kab );
|
||
|
}
|
||
|
|
||
|
role A
|
||
|
{
|
||
|
var nb: Nonce;
|
||
|
const na: Nonce;
|
||
|
const kab: Key;
|
||
|
|
||
|
read_1 (B,A, B,{ nb,B }pk(A) );
|
||
|
send_2 (A,B, { hash(nb),na,A,kab }pk(B) );
|
||
|
read_3 (B,A, { hash(na) }kab );
|
||
|
}
|
||
|
|
||
|
role testnonce
|
||
|
{
|
||
|
var n: Nonce;
|
||
|
|
||
|
read_4 (A,A, n);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
const Alice,Bob,Eve;
|
||
|
|
||
|
compromised sk(Eve);
|
||
|
|
||
|
|
||
|
run bkepk.A(Alice,Bob,Alice);
|
||
|
run bkepk.A(Alice,Bob,Alice);
|
||
|
run bkepk.A(Alice,Bob,Alice);
|
||
|
run bkepk.B(Bob,Alice,Alice);
|
||
|
run bkepk.B(Bob,Alice,Alice);
|
||
|
run bkepk.B(Bob,Alice,Alice);
|
||
|
|
||
|
run bkepk.testnonce(Alice,Bob,Alice);
|
||
|
run bkepk.testnonce(Alice,Bob,Alice);
|
||
|
run bkepk.testnonce(Alice,Bob,Alice);
|