Updating protocol descriptions.

This commit is contained in:
Cas Cremers 2010-12-31 15:41:52 +01:00
parent 94c9f1b444
commit 59080a2b5c
8 changed files with 22 additions and 29 deletions

View File

@ -37,3 +37,9 @@ protocol bke(I,R)
} }
} }
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve;
compromised sk(Eve);

View File

@ -72,9 +72,3 @@ compromised k(Alice,Eve);
compromised k(Bob,Eve); compromised k(Bob,Eve);
compromised k(Simon,Eve); compromised k(Simon,Eve);
run gongnonceb.I(Agent,Agent,Simon);
run gongnonceb.R(Agent,Agent,Simon);
run gongnonceb.S(Agent,Agent,Simon);
run gongnonceb.I(Agent,Agent,Simon);
run gongnonceb.R(Agent,Agent,Simon);
run gongnonceb.S(Agent,Agent,Simon);

View File

@ -1,3 +1,9 @@
/*
* From Boyd Mathuria
*
* To check: 3.38 or other?
*
*/
usertype Sessionkey; usertype Sessionkey;
usertype Keypart; usertype Keypart;
@ -63,9 +69,3 @@ compromised k(Alice,Eve);
compromised k(Bob,Eve); compromised k(Bob,Eve);
compromised k(Simon,Eve); compromised k(Simon,Eve);
run gongnonce.I(Agent,Agent,Simon);
run gongnonce.R(Agent,Agent,Simon);
run gongnonce.S(Agent,Agent,Simon);
run gongnonce.I(Agent,Agent,Simon);
run gongnonce.R(Agent,Agent,Simon);
run gongnonce.S(Agent,Agent,Simon);

View File

@ -54,9 +54,3 @@ compromised k(Alice,Eve);
compromised k(Bob,Eve); compromised k(Bob,Eve);
compromised k(Simon,Eve); compromised k(Simon,Eve);
run isoiec11770213.I(Agent,Agent,Simon);
run isoiec11770213.R(Agent,Agent,Simon);
run isoiec11770213.S(Agent,Agent,Simon);
run isoiec11770213.I(Agent,Agent,Simon);
run isoiec11770213.R(Agent,Agent,Simon);
run isoiec11770213.S(Agent,Agent,Simon);

View File

@ -39,3 +39,8 @@ protocol ns3(I,R)
} }
} }
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve;
compromised sk(Eve);

View File

@ -37,3 +37,8 @@ protocol nsl3(I,R)
} }
} }
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve;
compromised sk(Eve);

View File

@ -25,7 +25,3 @@ untrusted Eve;
const nc: Nonce; const nc: Nonce;
compromised sk(Eve); compromised sk(Eve);
run soph.I(Agent,Agent);
run soph.R(Agent,Agent);
run soph.I(Agent,Agent);
run soph.R(Agent,Agent);

View File

@ -36,12 +36,5 @@ const Simon: Server;
untrusted Eve; untrusted Eve;
compromised k(Eve,Simon); compromised k(Eve,Simon);
run wmfbrutus.A(Agent, Agent, Simon);
run wmfbrutus.B(Agent, Agent, Simon);
run wmfbrutus.A(Agent, Agent, Simon);
run wmfbrutus.B(Agent, Agent, Simon);
run wmfbrutus.A(Agent, Agent, Simon);
run wmfbrutus.B(Agent, Agent, Simon);
run wmfbrutus.S(Agent, Agent, Simon);