2005-04-04 14:50:59 +01:00
|
|
|
/*
|
|
|
|
Bilateral Key Exchange with Public Key protocol (BKEPK)
|
2005-04-04 15:06:57 +01:00
|
|
|
Variation for exercise 2r890
|
2005-04-04 14:50:59 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
usertype Key;
|
|
|
|
|
|
|
|
const pk,hash: Function;
|
|
|
|
secret sk,unhash: Function;
|
|
|
|
|
|
|
|
inversekeys (pk,sk);
|
|
|
|
inversekeys (hash,unhash);
|
|
|
|
|
2005-04-04 15:06:57 +01:00
|
|
|
protocol bkevariation(I,R)
|
2005-04-04 14:50:59 +01:00
|
|
|
{
|
|
|
|
role I
|
|
|
|
{
|
|
|
|
const ni: Nonce;
|
|
|
|
var nr: Nonce;
|
|
|
|
var kir: Key;
|
|
|
|
|
|
|
|
send_1 (I,R, { ni,I }pk(R) );
|
|
|
|
read_2 (R,I, { hash(ni),nr,kir }pk(I) );
|
|
|
|
send_3 (I,R, { hash(nr) }kir );
|
|
|
|
claim_4 (I, Secret, kir );
|
|
|
|
claim_5 (I, Niagree );
|
|
|
|
claim_6 (I, Nisynch );
|
|
|
|
}
|
|
|
|
|
|
|
|
role R
|
|
|
|
{
|
|
|
|
var ni: Nonce;
|
|
|
|
const nr: Nonce;
|
|
|
|
const kir: Key;
|
|
|
|
|
|
|
|
read_1 (I,R, { ni,I }pk(R) );
|
|
|
|
send_2 (R,I, { hash(ni),nr,kir }pk(I) );
|
|
|
|
read_3 (I,R, { hash(nr) }kir );
|
|
|
|
claim_7 (R, Secret, kir );
|
|
|
|
claim_8 (R, Niagree );
|
|
|
|
claim_9 (R, Nisynch );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const a,b,e: Agent;
|
|
|
|
|
|
|
|
untrusted e;
|
|
|
|
compromised sk(e);
|
|
|
|
const ne: Nonce;
|
|
|
|
|
2005-04-04 15:06:57 +01:00
|
|
|
run bkevariation.I(a,Agent);
|
|
|
|
run bkevariation.R(Agent,b);
|
|
|
|
run bkevariation.I(a,Agent);
|
|
|
|
run bkevariation.R(Agent,b);
|
2005-04-04 14:50:59 +01:00
|
|
|
|