text\<open>End marker for message bundles\<close> abbreviation END :: "msg"where "END == Number 0"
(*Two session keys are distributed to each agent except for the initiator, who receives one. Perhaps the two session keys could be bundled into a single message.
*) inductive_set(*Server's response to the nested message*)
respond :: "event list \ (msg*msg*key)set" for evs :: "event list" where
One: "Key KAB \ used evs \<Longrightarrow> (Hash[Key(shrK A)] \<lbrace>Agent A, Agent B, Nonce NA, END\<rbrace>, \<lbrace>Crypt (shrK A) \<lbrace>Key KAB, Agent B, Nonce NA\<rbrace>, END\<rbrace>,
KAB) \<in> respond evs"
(*The most recent session key is passed up to the caller*)
| Cons: "\(PA, RA, KAB) \ respond evs;
Key KBC \<notin> used evs; Key KBC \<notin> parts {RA};
PA = Hash[Key(shrK A)] \<lbrace>Agent A, Agent B, Nonce NA, P\<rbrace>\<rbrakk> \<Longrightarrow> (Hash[Key(shrK B)] \<lbrace>Agent B, Agent C, Nonce NB, PA\<rbrace>, \<lbrace>Crypt (shrK B) \<lbrace>Key KBC, Agent C, Nonce NB\<rbrace>,
Crypt (shrK B) \<lbrace>Key KAB, Agent A, Nonce NB\<rbrace>,
RA\<rbrace>,
KBC) \<in> respond evs"
(*Induction over "respond" can be difficult due to the complexity of the subgoals. Set "responses" captures the general form of certificates.
*) inductive_set
responses :: "event list => msg set" for evs :: "event list" where (*Server terminates lists*)
Nil: "END \ responses evs"
| Cons: "\RA \ responses evs; Key KAB \ used evs\ \<Longrightarrow> \<lbrace>Crypt (shrK B) \<lbrace>Key KAB, Agent A, Nonce NB\<rbrace>,
RA\<rbrace> \<in> responses evs"
inductive_set recur :: "event list set" where (*Initial trace is empty*)
Nil: "[] \ recur"
(*The spy MAY say anything he CAN say. Common to
all similar protocols.*)
| Fake: "\evsf \ recur; X \ synth (analz (knows Spy evsf))\ \<Longrightarrow> Says Spy B X # evsf \<in> recur"
(*Alice initiates a protocol run.
END is a placeholder to terminate the nesting.*)
| RA1: "\evs1 \ recur; Nonce NA \ used evs1\ \<Longrightarrow> Says A B (Hash[Key(shrK A)] \<lbrace>Agent A, Agent B, Nonce NA, END\<rbrace>)
# evs1 \<in> recur"
(*Bob's response to Alice's message. C might be the Server. We omit PA = \<lbrace>XA, Agent A, Agent B, Nonce NA, P\<rbrace> because
it complicates proofs, so B may respond to any message at all!*)
| RA2: "\evs2 \ recur; Nonce NB \ used evs2;
Says A' B PA \ set evs2\ \<Longrightarrow> Says B C (Hash[Key(shrK B)] \<lbrace>Agent B, Agent C, Nonce NB, PA\<rbrace>)
# evs2 \<in> recur"
(*The Server receives Bob's message and prepares a response.*)
| RA3: "\evs3 \ recur; Says B' Server PB \ set evs3;
(PB,RB,K) \<in> respond evs3\<rbrakk> \<Longrightarrow> Says Server B RB # evs3 \<in> recur"
(*Bob receives the returned message and compares the Nonces with
those in the message he previously sent the Server.*)
| RA4: "\evs4 \ recur;
Says B C \<lbrace>XH, Agent B, Agent C, Nonce NB,
XA, Agent A, Agent B, Nonce NA, P\<rbrace> \<in> set evs4;
Says C' B \Crypt (shrK B) \Key KBC, Agent C, Nonce NB\,
Crypt (shrK B) \<lbrace>Key KAB, Agent A, Nonce NB\<rbrace>,
RA\<rbrace> \<in> set evs4\<rbrakk> \<Longrightarrow> Says B A RA # evs4 \<in> recur"
(*No "oops" message can easily be expressed. Each session key is associated--in two separate messages--with two nonces. This is one try, but it isn't that useful. Re domino attack, note that Recur.thy proves that each session key is secure provided the two peers are, even if there are compromised agents elsewhere in the chain. Oops cases proved using parts_cut, Key_in_keysFor_parts, etc.
Oops: "\<lbrakk>evso \<in> recur; Says Server B RB \<in> set evso; RB \<in> responses evs'; Key K \<in> parts {RB}\<rbrakk> \<Longrightarrow> Notes Spy \<lbrace>Key K, RB\<rbrace> # evso \<in> recur"
*)
(** Possibility properties: traces that reach the end ONE theorem would be more elegant and faster! By induction on a list of agents (no repetitions)
**)
text\<open>Simplest case: Alice goes directly to the server\<close> lemma"Key K \ used [] \<Longrightarrow> \<exists>NA. \<exists>evs \<in> recur.
Says Server A \<lbrace>Crypt (shrK A) \<lbrace>Key K, Agent Server, Nonce NA\<rbrace>, END\<rbrace> \<in> set evs" apply (intro exI bexI) apply (rule_tac [2] recur.Nil [THEN recur.RA1, THEN recur.RA3 [OF _ _ respond.One]]) apply (possibility, simp add: used_Cons) done
text\<open>Case two: Alice, Bob and the server\<close> lemma"\Key K \ used []; Key K' \ used []; K \ K';
Nonce NA \<notin> used []; Nonce NB \<notin> used []; NA < NB\<rbrakk> \<Longrightarrow> \<exists>NA. \<exists>evs \<in> recur.
Says B A \<lbrace>Crypt (shrK A) \<lbrace>Key K, Agent B, Nonce NA\<rbrace>, END\<rbrace> \<in> set evs" apply (intro exI bexI) apply (rule_tac [2]
recur.Nil
[THEN recur.RA1 [of _ NA], THEN recur.RA2 [of _ NB], THEN recur.RA3 [OF _ _ respond.One
[THEN respond.Cons [of _ _ K _ K']]], THEN recur.RA4], possibility) apply (auto simp add: used_Cons) done
(*Case three: Alice, Bob, Charlie and the server Rather slow (5 seconds)*) lemma"\Key K \ used []; Key K' \ used [];
Key K''\<notin> used []; K \<noteq> K'; K' \<noteq> K''; K \<noteq> K'';
Nonce NA \<notin> used []; Nonce NB \<notin> used []; Nonce NC \<notin> used [];
NA < NB; NB < NC\<rbrakk> \<Longrightarrow> \<exists>K. \<exists>NA. \<exists>evs \<in> recur.
Says B A \<lbrace>Crypt (shrK A) \<lbrace>Key K, Agent B, Nonce NA\<rbrace>, END\<rbrace> \<in> set evs" apply (intro exI bexI) apply (rule_tac [2]
recur.Nil [THEN recur.RA1, THEN recur.RA2, THEN recur.RA2, THEN recur.RA3
[OF _ _ respond.One
[THEN respond.Cons, THEN respond.Cons]], THEN recur.RA4, THEN recur.RA4]) apply basic_possibility apply (tactic "DEPTH_SOLVE (swap_res_tac \<^context> [refl, conjI, disjCI] 1)") done
lemma respond_imp_not_used: "(PA,RB,KAB) \ respond evs \ Key KAB \ used evs" by (erule respond.induct, simp_all)
lemma Key_in_parts_respond [rule_format]: "\Key K \ parts {RB}; (PB,RB,K') \ respond evs\ \ Key K \ used evs" apply (erule rev_mp, erule respond.induct) apply (auto dest: Key_not_used respond_imp_not_used) done
lemma RA4_analz_spies: "Says C' B \Crypt K X, X', RA\ \ set evs \ RA \ analz (spies evs)" by blast
(*RA2_analz... and RA4_analz... let us treat those cases using the same argument as for the Fake case. This is possible for most, but not all, proofs: Fake does not invent new nonces (as in RA2), and of course Fake
messages originate from the Spy. *)
(** Theorems of the form X \<notin> parts (spies evs) imply that NOBODY
sends messages containing X! **)
(** Spy never sees another agent's shared key! (unless it's bad at start) **)
lemma Spy_see_shrK [simp]: "evs \ recur \ (Key (shrK A) \ parts (spies evs)) = (A \ bad)" apply (erule recur.induct, auto) txt\<open>RA3. It's ugly to call auto twice, but it seems necessary.\<close> apply (auto dest: Key_in_parts_respond simp add: parts_insert_spies) done
lemma Spy_analz_shrK [simp]: "evs \ recur \ (Key (shrK A) \ analz (spies evs)) = (A \ bad)" by auto
lemma Spy_see_shrK_D [dest!]: "\Key (shrK A) \ parts (knows Spy evs); evs \ recur\ \ A \ bad" by (blast dest: Spy_see_shrK)
(*** Proofs involving analz ***)
(** Session keys are not used to encrypt other session keys **)
(*Version for "responses" relation. Handles case RA3 in the theorem below. Note that it holds for *any* set H (not just "spies evs")
satisfying the inductive hypothesis.*) lemma resp_analz_image_freshK_lemma: "\RB \ responses evs; \<forall>K KK. KK \<subseteq> - (range shrK) \<longrightarrow>
(Key K \<in> analz (Key`KK \<union> H)) =
(K \<in> KK | Key K \<in> analz H)\<rbrakk> \<Longrightarrow> \<forall>K KK. KK \<subseteq> - (range shrK) \<longrightarrow>
(Key K \<in> analz (insert RB (Key`KK \<union> H))) =
(K \<in> KK | Key K \<in> analz (insert RB H))" apply (erule responses.induct) apply (simp_all del: image_insert
add: analz_image_freshK_simps, auto) done
text\<open>Version for the protocol. Proof is easy, thanks to the lemma.\<close> lemma raw_analz_image_freshK: "evs \ recur \ \<forall>K KK. KK \<subseteq> - (range shrK) \<longrightarrow>
(Key K \<in> analz (Key`KK \<union> (spies evs))) =
(K \<in> KK | Key K \<in> analz (spies evs))" apply (erule recur.induct) apply (drule_tac [4] RA2_analz_spies,
drule_tac [5] respond_imp_responses,
drule_tac [6] RA4_analz_spies, analz_freshK, spy_analz) txt\<open>RA3\<close> apply (simp_all add: resp_analz_image_freshK_lemma) done
(*Instance of the lemma with H replaced by (spies evs): \<lbrakk>RB \<in> responses evs; evs \<in> recur;\<rbrakk> \<Longrightarrow> KK \<subseteq> - (range shrK) \<longrightarrow> Key K \<in> analz (insert RB (Key`KK \<union> spies evs)) = (K \<in> KK | Key K \<in> analz (insert RB (spies evs)))
*) lemmas resp_analz_image_freshK =
resp_analz_image_freshK_lemma [OF _ raw_analz_image_freshK]
lemma analz_insert_freshK: "\evs \ recur; KAB \ range shrK\ \<Longrightarrow> (Key K \<in> analz (insert (Key KAB) (spies evs))) =
(K = KAB | Key K \<in> analz (spies evs))" by (simp del: image_insert
add: analz_image_freshK_simps raw_analz_image_freshK)
text\<open>Everything that's hashed is already in past traffic.\<close> lemma Hash_imp_body: "\Hash \Key(shrK A), X\ \ parts (spies evs);
evs \<in> recur; A \<notin> bad\<rbrakk> \<Longrightarrow> X \<in> parts (spies evs)" apply (erule rev_mp) apply (erule recur.induct,
drule_tac [6] RA4_parts_spies,
drule_tac [5] respond_imp_responses,
drule_tac [4] RA2_parts_spies) txt\<open>RA3 requires a further induction\<close> apply (erule_tac [5] responses.induct, simp_all) txt\<open>Fake\<close> apply (blast intro: parts_insertI) done
(** The Nonce NA uniquely identifies A's message. This theorem applies to steps RA1 and RA2!
Unicity is not used in other proofs but is desirable in its own right.
**)
lemma unique_NA: "\Hash \Key(shrK A), Agent A, B, NA, P\ \ parts (spies evs);
Hash \<lbrace>Key(shrK A), Agent A, B',NA, P'\<rbrace> \<in> parts (spies evs);
evs \<in> recur; A \<notin> bad\<rbrakk> \<Longrightarrow> B=B' \<and> P=P'" apply (erule rev_mp, erule rev_mp) apply (erule recur.induct,
drule_tac [5] respond_imp_responses) apply (force, simp_all) txt\<open>Fake\<close> apply blast apply (erule_tac [3] responses.induct) txt\<open>RA1,2: creation of new Nonce\<close> apply simp_all apply (blast dest!: Hash_imp_body)+ done
(*** Lemmas concerning the Server's response (relations "respond" and "responses")
***)
text\<open>The last key returned by respond indeed appears in a certificate\<close> lemma respond_certificate: "(Hash[Key(shrK A)] \Agent A, B, NA, P\, RA, K) \ respond evs \<Longrightarrow> Crypt (shrK A) \<lbrace>Key K, B, NA\<rbrace> \<in> parts {RA}" apply (ind_cases "(Hash[Key (shrK A)] \Agent A, B, NA, P\, RA, K) \ respond evs") apply simp_all done
(*This unicity proof differs from all the others in the HOL/Auth directory. The conclusion isn't quite unicity but duplicity, in that there are two possibilities. Also, the presence of two different matching messages in the inductive step complicates the case analysis. Unusually for such proofs,
the quantifiers appear to be necessary.*) lemma unique_lemma [rule_format]: "(PB,RB,KXY) \ respond evs \ \<forall>A B N. Crypt (shrK A) \<lbrace>Key K, Agent B, N\<rbrace> \<in> parts {RB} \<longrightarrow>
(\<forall>A' B' N'. Crypt (shrK A') \<lbrace>Key K, Agent B', N'\<rbrace> \<in> parts {RB} \<longrightarrow>
(A'=A \ B'=B) | (A'=B \ B'=A))" apply (erule respond.induct) apply (simp_all add: all_conj_distrib) apply (blast dest: respond_certificate) done
lemma unique_session_keys: "\Crypt (shrK A) \Key K, Agent B, N\ \ parts {RB};
Crypt (shrK A') \Key K, Agent B', N'\ \ parts {RB};
(PB,RB,KXY) \<in> respond evs\<rbrakk> \<Longrightarrow> (A'=A \<and> B'=B) | (A'=B \<and> B'=A)" by (rule unique_lemma, auto)
(** Crucial secrecy property: Spy does not see the keys sent in msg RA3 Does not in itself guarantee security: an attack could violate
the premises, e.g. by having A=Spy **)
lemma respond_Spy_not_see_session_key [rule_format]: "\(PB,RB,KAB) \ respond evs; evs \ recur\ \<Longrightarrow> \<forall>A A' N. A \<notin> bad \<and> A' \<notin> bad \<longrightarrow>
Crypt (shrK A) \<lbrace>Key K, Agent A', N\<rbrace> \<in> parts{RB} \<longrightarrow>
Key K \<notin> analz (insert RB (spies evs))" apply (erule respond.induct) apply (frule_tac [2] respond_imp_responses) apply (frule_tac [2] respond_imp_not_used) apply (simp_all del: image_insert parts_image
add: analz_image_freshK_simps split_ifs shrK_in_analz_respond
resp_analz_image_freshK parts_insert2) txt\<open>Base case of respond\<close> apply blast txt\<open>Inductive step of respond\<close> apply (intro allI conjI impI, simp_all) txt\<open>by unicity, either \<^term>\<open>B=Aa\<close> or \<^term>\<open>B=A'\<close>, a contradiction if\<^term>\<open>B \<in> bad\<close>\<close> apply (blast dest: unique_session_keys respond_certificate) apply (blast dest!: respond_certificate) apply (blast dest!: resp_analz_insert) done
text\<open>Only RA1 or RA2 can have caused such a part of a message to appear.
This result is of no useto B, who cannot verify the Hash. Moreover,
it can say nothing about how recent A's message is. It might later be
used to prove B's presence to A at the run's conclusion.\<close> lemma Hash_auth_sender [rule_format]: "\Hash \Key(shrK A), Agent A, Agent B, NA, P\ \ parts(spies evs);
A \<notin> bad; evs \<in> recur\<rbrakk> \<Longrightarrow> Says A B (Hash[Key(shrK A)] \<lbrace>Agent A, Agent B, NA, P\<rbrace>) \<in> set evs" unfolding HPair_def apply (erule rev_mp) apply (erule recur.induct,
drule_tac [6] RA4_parts_spies,
drule_tac [4] RA2_parts_spies,
simp_all) txt\<open>Fake, RA3\<close> apply (blast dest: Hash_in_parts_respond)+ done
(** These two results subsume (for all agents) the guarantees proved separately for A and B in the Otway-Rees protocol.
**)
text\<open>Certificates can only originate with the Server.\<close> lemma Cert_imp_Server_msg: "\Crypt (shrK A) Y \ parts (spies evs);
A \<notin> bad; evs \<in> recur\<rbrakk> \<Longrightarrow> \<exists>C RC. Says Server C RC \<in> set evs \<and>
Crypt (shrK A) Y \<in> parts {RC}" apply (erule rev_mp, erule recur.induct, simp_all) txt\<open>Fake\<close> apply blast txt\<open>RA1\<close> apply blast txt\<open>RA2: it cannot be a new Nonce, contradiction.\<close> apply blast txt\<open>RA3. Pity that the proof is so brittle: this step requires the rewriting,
which however would break all other steps.\<close> apply (simp add: parts_insert_spies, blast) txt\<open>RA4\<close> apply blast done
end
¤ Dauer der Verarbeitung: 0.14 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.