- Added KSL protocol (modified Kerberos)
- Removed bkepk (duplicate of bke)
This commit is contained in:
parent
4d6c98046e
commit
1dc997aac4
@ -1,60 +0,0 @@
|
|||||||
/*
|
|
||||||
Bilateral Key Exchange with Public Key protocol (BKEPK)
|
|
||||||
|
|
||||||
CMV version with explicit secrecy claims.
|
|
||||||
*/
|
|
||||||
|
|
||||||
usertype Key;
|
|
||||||
|
|
||||||
const pk,hash: Function;
|
|
||||||
secret sk,unhash: Function;
|
|
||||||
|
|
||||||
inversekeys (pk,sk);
|
|
||||||
inversekeys (hash,unhash);
|
|
||||||
|
|
||||||
protocol bkepk(A,B)
|
|
||||||
{
|
|
||||||
role B
|
|
||||||
{
|
|
||||||
const nb: Nonce;
|
|
||||||
var na: Nonce;
|
|
||||||
var kab: Key;
|
|
||||||
|
|
||||||
send_1 (B,A, B,{ nb,B }pk(A) );
|
|
||||||
read_2 (A,B, { hash(nb),na,A,kab }pk(B) );
|
|
||||||
send_3 (B,A, { hash(na) }kab );
|
|
||||||
|
|
||||||
claim_4 (B, Secret, na );
|
|
||||||
claim_5 (B, Secret, nb );
|
|
||||||
claim_6 (B, Niagree );
|
|
||||||
claim_7 (B, Nisynch );
|
|
||||||
}
|
|
||||||
|
|
||||||
role A
|
|
||||||
{
|
|
||||||
var nb: Nonce;
|
|
||||||
const na: Nonce;
|
|
||||||
const kab: Key;
|
|
||||||
|
|
||||||
read_1 (B,A, B,{ nb,B }pk(A) );
|
|
||||||
send_2 (A,B, { hash(nb),na,A,kab }pk(B) );
|
|
||||||
read_3 (B,A, { hash(na) }kab );
|
|
||||||
|
|
||||||
claim_8 (A, Secret, na );
|
|
||||||
claim_9 (A, Secret, nb );
|
|
||||||
claim_10 (A, Niagree);
|
|
||||||
claim_11 (A, Nisynch);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
const Alice,Bob,Eve;
|
|
||||||
|
|
||||||
compromised sk(Eve);
|
|
||||||
untrusted Eve;
|
|
||||||
|
|
||||||
run bkepk.A(Alice,Bob);
|
|
||||||
run bkepk.B(Alice,Bob);
|
|
||||||
run bkepk.A(Alice,Bob);
|
|
||||||
run bkepk.B(Alice,Bob);
|
|
||||||
|
|
||||||
|
|
83
spdl/ksl.spdl
Normal file
83
spdl/ksl.spdl
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
/*
|
||||||
|
* KSL from SPORE
|
||||||
|
*
|
||||||
|
* Messages 6-8 are intended for repeated authentication, and there are
|
||||||
|
* known attacks on this. However, we don't model that yet.
|
||||||
|
*
|
||||||
|
* Furthermore, it is interesting to experiment here with key
|
||||||
|
* compromise (of kab), when this is implemented in Scyther.
|
||||||
|
*/
|
||||||
|
|
||||||
|
usertype Server, SessionKey, GeneralizedTimestamp, Ticket, TicketKey;
|
||||||
|
secret k: Function;
|
||||||
|
|
||||||
|
const a, b, e: Agent;
|
||||||
|
const s: Server;
|
||||||
|
|
||||||
|
/* give the intruder something to work with */
|
||||||
|
|
||||||
|
const ne: Nonce;
|
||||||
|
const kee: SessionKey;
|
||||||
|
untrusted e;
|
||||||
|
compromised k(e,s);
|
||||||
|
|
||||||
|
protocol ksl(A,B,S)
|
||||||
|
{
|
||||||
|
role A
|
||||||
|
{
|
||||||
|
const Na, Ma: Nonce;
|
||||||
|
var Nc, Mb: Nonce;
|
||||||
|
var T: Ticket;
|
||||||
|
var Kab: SessionKey;
|
||||||
|
|
||||||
|
send_1(A,B, Na, A);
|
||||||
|
read_4(B,A, { Na,B,Kab }k(A,S), T, Nc, {Na}Kab );
|
||||||
|
send_5(A,B, { Nc }Kab );
|
||||||
|
|
||||||
|
send_6(A,B, Ma,T );
|
||||||
|
read_7(B,A, Mb,{Ma}Kab );
|
||||||
|
send_8(A,B, {Mb}Kab );
|
||||||
|
|
||||||
|
claim_A1(A,Secret, Kab);
|
||||||
|
claim_A2(A,Niagree);
|
||||||
|
claim_A3(A,Nisynch);
|
||||||
|
}
|
||||||
|
|
||||||
|
role B
|
||||||
|
{
|
||||||
|
var Na,Ma: Nonce;
|
||||||
|
const Nb,Nc,Mb: Nonce;
|
||||||
|
var Kab: SessionKey;
|
||||||
|
const Kbb: TicketKey;
|
||||||
|
const Tb: GeneralizedTimestamp;
|
||||||
|
var T: Ticket;
|
||||||
|
|
||||||
|
read_1(A,B, Na, A);
|
||||||
|
send_2(B,S, Na, A, Nb, B );
|
||||||
|
read_3(S,B, { Nb, A, Kab }k(B,S), T );
|
||||||
|
send_4(B,A, T, { Tb, A, Kab }Kbb, Nc, {Na}Kab );
|
||||||
|
read_5(A,B, { Nc }Kab );
|
||||||
|
|
||||||
|
read_6(A,B, Ma,{ Tb, A, Kab }Kbb );
|
||||||
|
send_7(B,A, Mb,{Ma}Kab );
|
||||||
|
read_8(A,B, {Mb}Kab );
|
||||||
|
|
||||||
|
claim_B1(B,Secret, Kab);
|
||||||
|
claim_B2(B,Niagree);
|
||||||
|
claim_B3(B,Nisynch);
|
||||||
|
}
|
||||||
|
|
||||||
|
role S
|
||||||
|
{
|
||||||
|
var Na, Nb: Nonce;
|
||||||
|
const Kab: SessionKey;
|
||||||
|
|
||||||
|
read_2(B,S, Na, A, Nb, B );
|
||||||
|
send_3(S,B, { Nb, A, Kab }k(B,S), { Na,B,Kab }k(A,S) );
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
run ksl.A(a,b,s);
|
||||||
|
run ksl.B(a,b,s);
|
||||||
|
run ksl.S(a,b,s);
|
||||||
|
|
@ -319,7 +319,7 @@ def RequiresAllProtocols (protocols, claim):
|
|||||||
simplercase.remove(redundantfile)
|
simplercase.remove(redundantfile)
|
||||||
# now test the validity of the claim
|
# now test the validity of the claim
|
||||||
simplerresults = ScytherEval (simplercase)
|
simplerresults = ScytherEval (simplercase)
|
||||||
if simplerresults[claim] == 0:
|
if claim in simplerresults.keys() and simplerresults[claim] == 0:
|
||||||
# Redundant protocol was not necessary for attack!
|
# Redundant protocol was not necessary for attack!
|
||||||
return 0
|
return 0
|
||||||
return 1
|
return 1
|
||||||
|
@ -13,7 +13,6 @@ def from_literature():
|
|||||||
list = [ \
|
list = [ \
|
||||||
"andrew-ban.spdl",
|
"andrew-ban.spdl",
|
||||||
"andrew-lowe-ban.spdl",
|
"andrew-lowe-ban.spdl",
|
||||||
"bkepk.spdl",
|
|
||||||
"bke.spdl",
|
"bke.spdl",
|
||||||
"boyd.spdl",
|
"boyd.spdl",
|
||||||
"ccitt509-ban.spdl",
|
"ccitt509-ban.spdl",
|
||||||
@ -25,6 +24,7 @@ def from_literature():
|
|||||||
"kaochow.spdl",
|
"kaochow.spdl",
|
||||||
"kaochow-v2.spdl",
|
"kaochow-v2.spdl",
|
||||||
"kaochow-v3.spdl",
|
"kaochow-v3.spdl",
|
||||||
|
"ksl.spdl",
|
||||||
"ns3.spdl",
|
"ns3.spdl",
|
||||||
"nsl3.spdl",
|
"nsl3.spdl",
|
||||||
"nsl7.spdl",
|
"nsl7.spdl",
|
||||||
|
Loading…
Reference in New Issue
Block a user