Tamarin prover
Farzane Karami November 2019
Tamarin prover Farzane Karami November 2019 Tamarin A tool for - - PowerPoint PPT Presentation
Tamarin prover Farzane Karami November 2019 Tamarin A tool for modeling and analysis of security protocols Core team: David Basin, Cas Cremers, Jannik Dreier, Simon Meier, Ralf Sasse, Benedikt Schmidt
Farzane Karami November 2019
Schmidt
π, π, π π΅ = π' πππ π πΏ = πΆ' πππ π πΏ = π'- πππ π b πΆ = π- πππ π πΏ = π΅- πππ π πΏ = π'- πππ π π, π, π΅ πΆ
π, π, π π΅ = π' πππ π πΏ
. = π' πππ π
b πΆ = π- πππ π πΏ0 = π- πππ π
π, π, π΅ πΆ
π¨ π = π2 πππ π πΏ
. = π΅2 πππ π
π, π, π
πΏ0 = πΆ2 πππ π
π
was used before in the victimβs communication
accordingly
where an attacker can:
β» eavesdrop messages β» intercept messages β» impersonate any agent β» encrypt or decrypts massages with the keys he has got β» repeat fake messages
the traces of the transition system
system state evolves
Person(βPeterβ, 50, married) Person(ββPeterββ, 50, divorced) Person(ββPeterββ, 50, dead) Person(ββPeterββ, 51, married)
the non-deterministic features
πππ π‘ππ π, π, π βΆ πππ π‘ππ π, π, πππ€ππ πππ if π > 40 β§ π == πππ π πππ
signature, πΉ is a set of equations, π is a set of labels, and π is a set of unconditional and conditional labeled rewrite rules [5].
reducible anymore
protocols
| {| Term |}aTerm | {| Term |}sTerm | Func(Termβ)
' : asymmetric encryption of the term t1 with the key t2
HT: honest agents which are not compromised by the attacker
The set of reachable states is infinite, limiting the number of threads or sessions that can be created to make it finite
traces of executions
system.
maches the left-hand-side of a rule, then this rule can be applied
prime-reuse-make-diffie-hellman- implementations-vulnerable
Maude, Peter Csaba Olveczky, 2018, Springer.
Research Directions in Concurrent Object-oriented Programming, 1993, MIT Press.
Model Checking, 2011, Citeseer.