scyther/src/notes.txt

18 lines
1.0 KiB
Plaintext
Raw Normal View History

- (!!) Are the Arachne rules for keys that are variables sane? E.g. what
2007-01-27 10:04:18 +00:00
is their inverse key? Check! Intuition: one cannot know what the
inverse is of a non-instantiated key variable, given the current
semantics, if asymmetric keys are allowed.
Consequence: the current implementation is just fine, because
asymmetric key variables cannot be defined in the language. Thus, the
rules are fine. Investigate for the other case.
- If no attack/state output is needed, maybe the attack heuristic should
be simpler (which means just weighting the trace length etc.) in order
to avoid uneccesary continuation of the search. Maybe even stop
altogether after finding *an* attack.
2005-12-09 13:15:34 +00:00
- For the TimeStamps etc, we can implement an 'auto-leak' of such local
constants. This should works also with a modifier of sorts (e.g.
'predictable') and such constants should be leaked to the intruder at
the start of the run, possibly by prefixing a send.
2004-04-23 11:58:43 +01:00
- knowledgeAddTerm might be improved by scanning through key list only with
things that are newly added.