- Add @ to swapkey, to disable it in classification

- Modify key Compromise for protocols that contain a timestamp to make the
  key compromise disclose a timestamp with a different type, namely 
  ExpiredTimeStamp so that they will not be accepted as timestamps in a new
  session, thereby simulating that they are expired.
This commit is contained in:
gijs
2005-08-12 11:55:24 +00:00
parent 149b774b18
commit 44bc36edc5
9 changed files with 24 additions and 17 deletions

View File

@@ -11,6 +11,7 @@
usertype SessionKey;
usertype TimeStamp;
usertype ExpiredTimeStamp;
const succ,pred: Function;
inversekeys (succ,pred);
const Fresh: Function;
@@ -25,7 +26,7 @@ protocol wmfLoweSessionKeyCompromise(C)
role C {
const Ni,Nr: Nonce;
const Kir: SessionKey;
const Ti,Ts: TimeStamp;
const Ti,Ts: ExpiredTimeStamp;
var I,R,S: Agent;
read_C1(C,C, I,R,S);