- Modified for better table compared speedtest.

This commit is contained in:
ccremers 2004-03-08 07:35:47 +00:00
parent 66bad3856c
commit dba0eab72b
2 changed files with 20 additions and 25 deletions

View File

@ -51,11 +51,10 @@ compromised sk(Eve);
run bkepk.A(Alice,Bob,Alice); run bkepk.A(Alice,Bob,Alice);
run bkepk.A(Alice,Bob,Alice); run bkepk.A(Alice,Bob,Alice);
run bkepk.A(Alice,Bob,Alice); run bkepk.B(Alice,Bob,Alice);
run bkepk.B(Bob,Alice,Alice); run bkepk.B(Alice,Bob,Alice);
run bkepk.B(Bob,Alice,Alice); run bkepk.testnonce(Alice,Bob,Alice);
run bkepk.B(Bob,Alice,Alice); run bkepk.testnonce(Alice,Bob,Alice);
run bkepk.testnonce(Alice,Bob,Alice); run bkepk.A(Alice,Bob,Alice);
run bkepk.testnonce(Alice,Bob,Alice);
run bkepk.testnonce(Alice,Bob,Alice); run bkepk.testnonce(Alice,Bob,Alice);

View File

@ -1,8 +1,7 @@
/* /*
Bilateral Key Exchange with Public Key protocol (BKEPK) Bilateral Key Exchange with Public Key protocol (BKEPK)
Version from Corin/Etalle: An Improved Constraint-Based System for the Verification of Security Protocols. CMV version with explicit secrecy claims.
Tried to stay as close as possible to compare timing results.
*/ */
usertype Key; usertype Key;
@ -13,7 +12,7 @@ secret sk,unhash: Function;
inversekeys (pk,sk); inversekeys (pk,sk);
inversekeys (hash,unhash); inversekeys (hash,unhash);
protocol bkepk(A,B,testnonce) protocol bkepk(A,B)
{ {
role B role B
{ {
@ -24,6 +23,7 @@ protocol bkepk(A,B,testnonce)
send_1 (B,A, B,{ nb,B }pk(A) ); send_1 (B,A, B,{ nb,B }pk(A) );
read_2 (A,B, { hash(nb),na,A,kab }pk(B) ); read_2 (A,B, { hash(nb),na,A,kab }pk(B) );
send_3 (B,A, { hash(na) }kab ); send_3 (B,A, { hash(na) }kab );
claim_4 (B, Secret, na,nb );
} }
role A role A
@ -35,13 +35,7 @@ protocol bkepk(A,B,testnonce)
read_1 (B,A, B,{ nb,B }pk(A) ); read_1 (B,A, B,{ nb,B }pk(A) );
send_2 (A,B, { hash(nb),na,A,kab }pk(B) ); send_2 (A,B, { hash(nb),na,A,kab }pk(B) );
read_3 (B,A, { hash(na) }kab ); read_3 (B,A, { hash(na) }kab );
} claim_5 (A, Secret, na,nb );
role testnonce
{
var n: Nonce;
read_4 (A,A, n);
} }
} }
@ -49,14 +43,16 @@ const Alice,Bob,Eve;
compromised sk(Eve); compromised sk(Eve);
run bkepk.A(Alice,Bob);
run bkepk.B(Alice,Bob);
run bkepk.A(Alice,Bob);
run bkepk.B(Alice,Bob);
run bkepk.A(Alice,Bob,Alice); run bkepk.A(Alice,Bob);
run bkepk.A(Alice,Bob,Alice); run bkepk.B(Alice,Bob);
run bkepk.A(Alice,Bob,Alice); run bkepk.A(Alice,Bob);
run bkepk.B(Bob,Alice,Alice); run bkepk.B(Alice,Bob);
run bkepk.B(Bob,Alice,Alice);
run bkepk.B(Bob,Alice,Alice); run bkepk.A(Alice,Bob);
run bkepk.B(Alice,Bob);
run bkepk.testnonce(Alice,Bob,Alice);
run bkepk.testnonce(Alice,Bob,Alice);
run bkepk.testnonce(Alice,Bob,Alice);