(* Title: HOL/Auth/KerberosIV.thy Author: Giampaolo Bella, Cambridge University Computer Laboratory Copyright 1998 University of Cambridge
*)
section\<open>The Kerberos Protocol, Version IV\<close>
theory KerberosIV imports Public begin
text\<open>The "u" prefix indicates theorems referring to an updated version of the protocol. The "r" suffix indicates theorems where the confidentiality assumptions are relaxed by the corresponding arguments.\<close>
abbreviation
Kas :: agent where"Kas == Server"
abbreviation
Tgs :: agent where"Tgs == Friend 0"
axiomatizationwhere
Tgs_not_bad [iff]: "Tgs \ bad" \<comment> \<open>Tgs is secure --- we already know that Kas is secure\<close>
definition (* authKeys are those contained in an authTicket *)
authKeys :: "event list \ key set" where "authKeys evs = {authK. \A Peer Ta. Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Peer, Number Ta,
(Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key authK, Number Ta\<rbrace>) \<rbrace>) \<in> set evs}"
definition (* A is the true creator of X if she has sent X and X never appeared on
the trace before this event. Recall that traces grow from head. *)
Issues :: "[agent, agent, msg, event list] \ bool"
(\<open>_ Issues _ with _ on _\<close> [50, 0, 0, 50] 50) where "(A Issues B with X on evs) =
(\<exists>Y. Says A B Y \<in> set evs \<and> X \<in> parts {Y} \<and>
X \<notin> parts (spies (takeWhile (\<lambda>z. z \<noteq> Says A B Y) (rev evs))))"
definition (* Yields the subtrace of a given trace from its beginning to a given event *)
before :: "[event, event list] \ event list" (\before _ on _\ [0, 50] 50) where"(before ev on evs) = takeWhile (\z. z \ ev) (rev evs)"
definition (* States than an event really appears only once on a trace *)
Unique :: "[event, event list] \ bool" (\Unique _ on _\ [0, 50] 50) where"(Unique ev on evs) = (ev \ set (tl (dropWhile (\z. z \ ev) evs)))"
consts (*Duration of the authentication key*)
authKlife :: nat
(*Duration of the service key*)
servKlife :: nat
(*Duration of an authenticator*)
authlife :: nat
(*Upper bound on the time of reaction of a server*)
replylife :: nat
specification (authKlife)
authKlife_LB [iff]: "2 \ authKlife" by blast
(* Predicate formalising the association between authKeys and servKeys *) definition AKcryptSK :: "[key, key, event list] \ bool" where "AKcryptSK authK servK evs == \<exists>A B Ts.
Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<rbrace>) \<in> set evs"
inductive_set kerbIV :: "event list set" where
Nil: "[] \ kerbIV"
| Fake: "\ evsf \ kerbIV; X \ synth (analz (spies evsf)) \ \<Longrightarrow> Says Spy B X # evsf \<in> kerbIV"
(* FROM the initiator *)
| K1: "\ evs1 \ kerbIV \ \<Longrightarrow> Says A Kas \<lbrace>Agent A, Agent Tgs, Number (CT evs1)\<rbrace> # evs1 \<in> kerbIV"
(* Adding the timestamp serves to A in K3 to check that she doesn't get a reply too late. This kind of timeouts are ordinary.
If a server's reply is late, then it is likely to be fake. *)
(*FROM Kas *)
| K2: "\ evs2 \ kerbIV; Key authK \ used evs2; authK \ symKeys;
Says A' Kas \Agent A, Agent Tgs, Number T1\ \ set evs2 \ \<Longrightarrow> Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number (CT evs2),
(Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK,
Number (CT evs2)\<rbrace>)\<rbrace>) # evs2 \<in> kerbIV" (* The internal encryption builds the authTicket. The timestamp doesn't change inside the two encryptions: the external copy will be used by the initiator in K3; the one inside the authTicket by Tgs in K4.
*)
(* FROM the initiator *)
| K3: "\ evs3 \ kerbIV;
Says A Kas \<lbrace>Agent A, Agent Tgs, Number T1\<rbrace> \<in> set evs3;
Says Kas' A (Crypt (shrK A) \Key authK, Agent Tgs, Number Ta,
authTicket\<rbrace>) \<in> set evs3;
valid Ta wrt T1 \<rbrakk> \<Longrightarrow> Says A Tgs \<lbrace>authTicket,
(Crypt authK \<lbrace>Agent A, Number (CT evs3)\<rbrace>),
Agent B\<rbrace> # evs3 \<in> kerbIV" (*The two events amongst the premises allow A to accept only those authKeys
that are not issued late. *)
(* FROM Tgs *) (* Note that the last temporal check is not mentioned in the original MIT specification. Adding it makes many goals "available" to the peers. Theorems that exploit it have the suffix `_u', which stands for updated protocol.
*)
| K4: "\ evs4 \ kerbIV; Key servK \ used evs4; servK \ symKeys;
B \<noteq> Tgs; authK \<in> symKeys;
Says A' Tgs \
(Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK,
Number Ta\<rbrace>),
(Crypt authK \<lbrace>Agent A, Number T2\<rbrace>), Agent B\<rbrace> \<in> set evs4; \<not> expiredAK Ta evs4; \<not> expiredA T2 evs4;
servKlife + (CT evs4) \<le> authKlife + Ta \<rbrakk> \<Longrightarrow> Says Tgs A
(Crypt authK \<lbrace>Key servK, Agent B, Number (CT evs4),
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK,
Number (CT evs4)\<rbrace> \<rbrace>)
# evs4 \<in> kerbIV" (* Tgs creates a new session key per each request for a service, without checking if there is still a fresh one for that service. The cipher under Tgs' key is the authTicket, the cipher under B's key is the servTicket, which is built now. NOTE that the last temporal check is not present in the MIT specification.
(* FROM the initiator *)
| K5: "\ evs5 \ kerbIV; authK \ symKeys; servK \ symKeys;
Says A Tgs \<lbrace>authTicket, Crypt authK \<lbrace>Agent A, Number T2\<rbrace>,
Agent B\<rbrace> \<in> set evs5;
Says Tgs' A
(Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs5;
valid Ts wrt T2 \<rbrakk> \<Longrightarrow> Says A B \<lbrace>servTicket,
Crypt servK \<lbrace>Agent A, Number (CT evs5)\<rbrace> \<rbrace>
# evs5 \<in> kerbIV" (* Checks similar to those in K3. *)
(* FROM the responder*)
| K6: "\ evs6 \ kerbIV;
Says A' B \
(Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>),
(Crypt servK \<lbrace>Agent A, Number T3\<rbrace>)\<rbrace> \<in> set evs6; \<not> expiredSK Ts evs6; \<not> expiredA T3 evs6 \<rbrakk> \<Longrightarrow> Says B A (Crypt servK (Number T3))
# evs6 \<in> kerbIV" (* Checks similar to those in K4. *)
(* Leaking an authK... *)
| Oops1: "\ evsO1 \ kerbIV; A \ Spy;
Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
authTicket\<rbrace>) \<in> set evsO1;
expiredAK Ta evsO1 \<rbrakk> \<Longrightarrow> Says A Spy \<lbrace>Agent A, Agent Tgs, Number Ta, Key authK\<rbrace>
# evsO1 \<in> kerbIV"
subsection\<open>Lemmas about lists, for reasoning about Issues\<close>
lemma spies_Says_rev: "spies (evs @ [Says A B X]) = insert X (spies evs)" apply (induct_tac "evs") apply (rename_tac [2] a b) apply (induct_tac [2] a, auto) done
lemma spies_Gets_rev: "spies (evs @ [Gets A X]) = spies evs" apply (induct_tac "evs") apply (rename_tac [2] a b) apply (induct_tac [2] a, auto) done
lemma spies_Notes_rev: "spies (evs @ [Notes A X]) =
(if A\<in>bad then insert X (spies evs) else spies evs)" apply (induct_tac "evs") apply (rename_tac [2] a b) apply (induct_tac [2] a, auto) done
lemma spies_evs_rev: "spies evs = spies (rev evs)" apply (induct_tac "evs") apply (rename_tac [2] a b) apply (induct_tac [2] a) apply (simp_all (no_asm_simp) add: spies_Says_rev spies_Gets_rev spies_Notes_rev) done
lemmas parts_spies_evs_revD2 = spies_evs_rev [THEN equalityD2, THEN parts_mono]
lemma spies_takeWhile: "spies (takeWhile P evs) \ spies evs" apply (induct_tac "evs") apply (rename_tac [2] a b) apply (induct_tac [2] "a", auto) txt\<open>Resembles \<open>used_subset_append\<close> in theory Event.\<close> done
lemma authKeys_not_insert: "(\A Ta akey Peer.
ev \<noteq> Says Kas A (Crypt (shrK A) \<lbrace>akey, Agent Peer, Ta,
(Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, akey, Ta\<rbrace>)\<rbrace>)) \<Longrightarrow> authKeys (ev # evs) = authKeys evs" unfolding authKeys_def by auto
lemma authKeys_insert: "authKeys
(Says Kas A (Crypt (shrK A) \<lbrace>Key K, Agent Peer, Number Ta,
(Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key K, Number Ta\<rbrace>)\<rbrace>) # evs)
= insert K (authKeys evs)" unfolding authKeys_def by auto
lemma authKeys_simp: "K \ authKeys
(Says Kas A (Crypt (shrK A) \<lbrace>Key K', Agent Peer, Number Ta,
(Crypt (shrK Peer) \<lbrace>Agent A, Agent Peer, Key K', Number Ta\<rbrace>)\<rbrace>) # evs) \<Longrightarrow> K = K' | K \<in> authKeys evs" unfolding authKeys_def by auto
lemma authKeysI: "Says Kas A (Crypt (shrK A) \Key K, Agent Tgs, Number Ta,
(Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key K, Number Ta\<rbrace>)\<rbrace>) \<in> set evs \<Longrightarrow> K \<in> authKeys evs" unfolding authKeys_def by auto
lemma authKeys_used: "K \ authKeys evs \ Key K \ used evs" by (simp add: authKeys_def, blast)
subsection\<open>Forwarding Lemmas\<close>
text\<open>--For reasoning about the encrypted portion of message K3--\<close> lemma K3_msg_in_parts_spies: "Says Kas' A (Crypt KeyA \authK, Peer, Ta, authTicket\) \<in> set evs \<Longrightarrow> authTicket \<in> parts (spies evs)" by blast
lemma Oops_range_spies1: "\ Says Kas A (Crypt KeyA \Key authK, Peer, Ta, authTicket\) \<in> set evs ;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> authK \<notin> range shrK \<and> authK \<in> symKeys" apply (erule rev_mp) apply (erule kerbIV.induct, auto) done
text\<open>--For reasoning about the encrypted portion of message K5--\<close> lemma K5_msg_in_parts_spies: "Says Tgs' A (Crypt authK \servK, Agent B, Ts, servTicket\) \<in> set evs \<Longrightarrow> servTicket \<in> parts (spies evs)" by blast
lemma Says_ticket_parts: "Says S A (Crypt K \SesKey, B, TimeStamp, Ticket\) \ set evs \<Longrightarrow> Ticket \<in> parts (spies evs)" by blast
(*Spy never sees another agent's shared key! (unless it's lost at start)*) lemma Spy_see_shrK [simp]: "evs \ kerbIV \ (Key (shrK A) \ parts (spies evs)) = (A \ bad)" apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) apply (blast+) done
lemma Spy_analz_shrK [simp]: "evs \ kerbIV \ (Key (shrK A) \ analz (spies evs)) = (A \ bad)" by auto
lemma Spy_see_shrK_D [dest!]: "\ Key (shrK A) \ parts (spies evs); evs \ kerbIV \ \ A\bad" by (blast dest: Spy_see_shrK)
lemmas Spy_analz_shrK_D = analz_subset_parts [THEN subsetD, THEN Spy_see_shrK_D, dest!]
text\<open>Nobody can have used non-existent keys!\<close> lemma new_keys_not_used [simp]: "\Key K \ used evs; K \ symKeys; evs \ kerbIV\ \<Longrightarrow> K \<notin> keysFor (parts (spies evs))" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) txt\<open>Fake\<close> apply (force dest!: keysFor_parts_insert) txt\<open>Others\<close> apply (force dest!: analz_shrK_Decrypt)+ done
(*Earlier, all protocol proofs declared this theorem.
But few of them actually need it! (Another is Yahalom) *) lemma new_keys_not_analzd: "\evs \ kerbIV; K \ symKeys; Key K \ used evs\ \<Longrightarrow> K \<notin> keysFor (analz (spies evs))" by (blast dest: new_keys_not_used intro: keysFor_mono [THEN subsetD])
subsection\<open>Lemmas for reasoning about predicate "before"\<close>
lemma used_Says_rev: "used (evs @ [Says A B X]) = parts {X} \ (used evs)" apply (induct_tac "evs") apply simp apply (rename_tac a b) apply (induct_tac "a") apply auto done
lemma used_Notes_rev: "used (evs @ [Notes A X]) = parts {X} \ (used evs)" apply (induct_tac "evs") apply simp apply (rename_tac a b) apply (induct_tac "a") apply auto done
lemma used_Gets_rev: "used (evs @ [Gets B X]) = used evs" apply (induct_tac "evs") apply simp apply (rename_tac a b) apply (induct_tac "a") apply auto done
lemma used_takeWhile_used [rule_format]: "x \ used (takeWhile P X) \ x \ used X" apply (induct_tac "X") apply simp apply (rename_tac a b) apply (induct_tac "a") apply (simp_all add: used_Nil) apply (blast dest!: initState_into_used)+ done
lemma set_evs_rev: "set evs = set (rev evs)" by auto
lemma takeWhile_void [rule_format]: "x \ set evs \ takeWhile (\z. z \ x) evs = evs" by auto
subsection\<open>Regularity Lemmas\<close> text\<open>These concern the form of items passed in messages\<close>
text\<open>Describes the form of all components sent by Kas\<close> lemma Says_Kas_message_form: "\ Says Kas A (Crypt K \Key authK, Agent Peer, Number Ta, authTicket\) \<in> set evs;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow>
K = shrK A \<and> Peer = Tgs \<and>
authK \<notin> range shrK \<and> authK \<in> authKeys evs \<and> authK \<in> symKeys \<and>
authTicket = (Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>) \<and>
Key authK \<notin> used(before
Says Kas A (Crypt K \<lbrace>Key authK, Agent Peer, Number Ta, authTicket\<rbrace>)
on evs) \<and>
Ta = CT (before
Says Kas A (Crypt K \<lbrace>Key authK, Agent Peer, Number Ta, authTicket\<rbrace>)
on evs)" unfolding before_def apply (erule rev_mp) apply (erule kerbIV.induct) apply (simp_all (no_asm) add: authKeys_def authKeys_insert, blast, blast) txt\<open>K2\<close> apply (simp (no_asm) add: takeWhile_tail) apply (rule conjI) apply (metis Key_not_used authKeys_used length_rev set_rev takeWhile_void used_evs_rev) apply blast+ done
(*This lemma is essential for proving Says_Tgs_message_form:
the session key authK supplied by Kas in the authentication ticket cannot be a long-term key!
Generalised to any session keys (both authK and servK).
*) lemma SesKey_is_session_key: "\ Crypt (shrK Tgs_B) \Agent A, Agent Tgs_B, Key SesKey, Number T\ \<in> parts (spies evs); Tgs_B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> SesKey \<notin> range shrK" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, blast) done
lemma authTicket_authentic: "\ Crypt (shrK Tgs) \Agent A, Agent Tgs, Key authK, Number Ta\ \<in> parts (spies evs);
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says Kas A (Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) txt\<open>Fake, K4\<close> apply (blast+) done
text\<open>Authenticity of servK for B\<close> lemma servTicket_authentic_Tgs: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>authK.
Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace>) \<in> set evs" apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) apply blast+ done
text\<open>Anticipated here from next subsection\<close> lemma K4_imp_K2: "\ Says Tgs A (Crypt authK \Key servK, Agent B, Number Ts, servTicket\) \<in> set evs; evs \<in> kerbIV\<rbrakk> \<Longrightarrow> \<exists>Ta. Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, auto) apply (blast dest!: Says_imp_spies [THEN parts.Inj, THEN parts.Fst, THEN authTicket_authentic]) done
text\<open>Anticipated here from next subsection\<close> lemma u_K4_imp_K2: "\ Says Tgs A (Crypt authK \Key servK, Agent B, Number Ts, servTicket\) \<in> set evs; evs \<in> kerbIV\<rbrakk> \<Longrightarrow> \<exists>Ta. (Says Kas A (Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs \<and> servKlife + Ts \<le> authKlife + Ta)" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, auto) apply (blast dest!: Says_imp_spies [THEN parts.Inj, THEN parts.Fst, THEN authTicket_authentic]) done
lemma servTicket_authentic_Kas: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>authK Ta.
Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs" by (blast dest!: servTicket_authentic_Tgs K4_imp_K2)
lemma u_servTicket_authentic_Kas: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>authK Ta. Says Kas A (Crypt(shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs \<and> servKlife + Ts \<le> authKlife + Ta" by (blast dest!: servTicket_authentic_Tgs u_K4_imp_K2)
lemma servTicket_authentic: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>Ta authK.
Says Kas A (Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs \<and> Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace>) \<in> set evs" by (blast dest: servTicket_authentic_Tgs K4_imp_K2)
lemma u_servTicket_authentic: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); B \<noteq> Tgs; B \<notin> bad;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>Ta authK.
(Says Kas A (Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs \<and> Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>\<rbrace>) \<in> set evs \<and> servKlife + Ts \<le> authKlife + Ta)" by (blast dest: servTicket_authentic_Tgs u_K4_imp_K2)
lemma u_NotexpiredSK_NotexpiredAK: "\ \ expiredSK Ts evs; servKlife + Ts \ authKlife + Ta \ \<Longrightarrow> \<not> expiredAK Ta evs" by (metis le_less_trans)
subsection\<open>Reliability: friendly agents send something if something else happened\<close>
lemma K3_imp_K2: "\ Says A Tgs \<lbrace>authTicket, Crypt authK \<lbrace>Agent A, Number T2\<rbrace>, Agent B\<rbrace> \<in> set evs;
A \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists>Ta. Says Kas A (Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace>) \<in> set evs" apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, blast, blast) apply (blast dest: Says_imp_spies [THEN parts.Inj, THEN authK_authentic]) done
text\<open>Anticipated here from next subsection. An authK is encrypted by one and only one Shared key. A servK is encrypted by one and only one authK.\<close> lemma Key_unique_SesKey: "\ Crypt K \Key SesKey, Agent B, T, Ticket\ \<in> parts (spies evs);
Crypt K' \Key SesKey, Agent B', T', Ticket'\ \<in> parts (spies evs); Key SesKey \<notin> analz (spies evs);
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> K=K' \<and> B=B' \<and> T=T' \<and> Ticket=Ticket'" apply (erule rev_mp) apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct, analz_mono_contra) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) txt\<open>Fake, K2, K4\<close> apply (blast+) done
lemma Tgs_authenticates_A: "\ Crypt authK \Agent A, Number T2\ \ parts (spies evs);
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace> \<in> parts (spies evs);
Key authK \<notin> analz (spies evs); A \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<exists> B. Says A Tgs \<lbrace>
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>,
Crypt authK \<lbrace>Agent A, Number T2\<rbrace>, Agent B \<rbrace> \<in> set evs" apply (drule authTicket_authentic, assumption, rotate_tac 4) apply (erule rev_mp, erule rev_mp, erule rev_mp) apply (erule kerbIV.induct, analz_mono_contra) apply (frule_tac [5] Says_ticket_parts) apply (frule_tac [7] Says_ticket_parts) apply (simp_all (no_asm_simp) add: all_conj_distrib) txt\<open>Fake\<close> apply blast txt\<open>K2\<close> apply (force dest!: Crypt_imp_keysFor) txt\<open>K3\<close> apply (blast dest: Key_unique_SesKey) txt\<open>K5\<close> apply (metis K3_imp_K2 Key_unique_SesKey Spy_see_shrK parts.Body parts.Fst
Says_imp_knows_Spy [THEN parts.Inj]) done
lemma Says_K5: "\ Crypt servK \Agent A, Number T3\ \ parts (spies evs);
Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
servTicket\<rbrace>) \<in> set evs;
Key servK \<notin> analz (spies evs);
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says A B \<lbrace>servTicket, Crypt servK \<lbrace>Agent A, Number T3\<rbrace>\<rbrace> \<in> set evs" apply (erule rev_mp) apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct, analz_mono_contra) apply (frule_tac [5] Says_ticket_parts) apply (frule_tac [7] Says_ticket_parts) apply (simp_all (no_asm_simp) add: all_conj_distrib) apply blast txt\<open>K3\<close> apply (blast dest: authK_authentic Says_Kas_message_form Says_Tgs_message_form) txt\<open>K4\<close> apply (force dest!: Crypt_imp_keysFor) txt\<open>K5\<close> apply (blast dest: Key_unique_SesKey) done
text\<open>Needs a unicity theorem, hence moved here\<close> lemma servK_authentic_ter: "\ Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace>) \<in> set evs;
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Key authK \<notin> analz (spies evs);
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs" apply (frule Says_Kas_message_form, assumption) apply (erule rev_mp) apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct, analz_mono_contra) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, blast) txt\<open>K2\<close> apply (blast dest!: servK_authentic Says_Tgs_message_form authKeys_used) txt\<open>K4 remain\<close> apply (blast dest!: unique_CryptKey) done
subsection\<open>Unicity Theorems\<close>
text\<open>The session key, if secure, uniquely identifies the Ticket
whether authTicket or servTicket. As a matter of fact, one can read also Tgs in the place of B.\<close>
(* At reception of any message mentioning A, Kas associates shrK A with a new authK. Realistic, as the user gets a new authK at each login. Similarly, at reception of any message mentioning an authK (a legitimate user could make several requests to Tgs - by K3), Tgs associates it with a new servK.
Therefore, a goal like
"evs \<in> kerbIV \<Longrightarrow> Key Kc \<notin> analz (spies evs) \<longrightarrow> (\<exists>K' B' T' Ticket'. \<forall>K B T Ticket. Crypt Kc \<lbrace>Key K, Agent B, T, Ticket\<rbrace> \<in> parts (spies evs) \<longrightarrow> K=K' \<and> B=B' \<and> T=T' \<and> Ticket=Ticket')"
would fail on the K2 and K4 cases.
*)
lemma unique_authKeys: "\ Says Kas A
(Crypt Ka \<lbrace>Key authK, Agent Tgs, Ta, X\<rbrace>) \<in> set evs;
Says Kas A'
(Crypt Ka' \Key authK, Agent Tgs, Ta', X'\) \ set evs;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> A=A' \<and> Ka=Ka' \<and> Ta=Ta' \<and> X=X'" apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) txt\<open>K2\<close> apply blast done
text\<open>servK uniquely identifies the message from Tgs\<close> lemma unique_servKeys: "\ Says Tgs A
(Crypt K \<lbrace>Key servK, Agent B, Ts, X\<rbrace>) \<in> set evs;
Says Tgs A'
(Crypt K' \Key servK, Agent B', Ts', X'\) \ set evs;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> A=A' \<and> B=B' \<and> K=K' \<and> Ts=Ts' \<and> X=X'" apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all) txt\<open>K4\<close> apply blast done
text\<open>Revised unicity theorems\<close>
lemma Kas_Unique: "\ Says Kas A
(Crypt Ka \<lbrace>Key authK, Agent Tgs, Ta, authTicket\<rbrace>) \<in> set evs;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow>
Unique (Says Kas A (Crypt Ka \<lbrace>Key authK, Agent Tgs, Ta, authTicket\<rbrace>))
on evs" apply (erule rev_mp, erule kerbIV.induct, simp_all add: Unique_def) apply blast done
lemma AKcryptSKI: "\ Says Tgs A (Crypt authK \Key servK, Agent B, Number Ts, X \) \ set evs;
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> AKcryptSK authK servK evs" unfolding AKcryptSK_def apply (blast dest: Says_Tgs_message_form) done
lemma AKcryptSK_Says [simp]: "AKcryptSK authK servK (Says S A X # evs) =
(Tgs = S \<and>
(\<exists>B Ts. X = Crypt authK \<lbrace>Key servK, Agent B, Number Ts,
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<rbrace>)
| AKcryptSK authK servK evs)" by (auto simp add: AKcryptSK_def)
(*A fresh authK cannot be associated with any other
(with respect to a given trace). *) lemma Auth_fresh_not_AKcryptSK: "\ Key authK \ used evs; evs \ kerbIV \ \<Longrightarrow> \<not> AKcryptSK authK servK evs" unfolding AKcryptSK_def apply (erule rev_mp) apply (erule kerbIV.induct) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, blast) done
(*A fresh servK cannot be associated with any other
(with respect to a given trace). *) lemma Serv_fresh_not_AKcryptSK: "Key servK \ used evs \ \ AKcryptSK authK servK evs" unfolding AKcryptSK_def by blast
text\<open>The only session keys that can be found with the help of session keys are
those sent by Tgs in step K4.\<close>
text\<open>We take some pains to express the property
as a logical equivalence so that the simplifier can apply it.\<close> lemma Key_analz_image_Key_lemma: "P \ (Key K \ analz (Key`KK \ H)) \ (K\KK | Key K \ analz H) \<Longrightarrow>
P \<longrightarrow> (Key K \<in> analz (Key`KK \<union> H)) = (K\<in>KK | Key K \<in> analz H)" by (blast intro: analz_mono [THEN subsetD])
lemma AKcryptSK_analz_insert: "\ AKcryptSK K K' evs; K \ symKeys; evs \ kerbIV \ \<Longrightarrow> Key K' \<in> analz (insert (Key K) (spies evs))" apply (simp add: AKcryptSK_def, clarify) apply (drule Says_imp_spies [THEN analz.Inj, THEN analz_insertI], auto) done
lemma authKeys_are_not_AKcryptSK: "\ K \ authKeys evs \ range shrK; evs \ kerbIV \ \<Longrightarrow> \<forall>SK. \<not> AKcryptSK SK K evs \<and> K \<in> symKeys" apply (simp add: authKeys_def AKcryptSK_def) apply (blast dest: Says_Kas_message_form Says_Tgs_message_form) done
lemma not_authKeys_not_AKcryptSK: "\ K \ authKeys evs;
K \<notin> range shrK; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> \<forall>SK. \<not> AKcryptSK K SK evs" apply (simp add: AKcryptSK_def) apply (blast dest: Says_Tgs_message_form) done
subsection\<open>Secrecy Theorems\<close>
text\<open>For the Oops2 case of the next theorem\<close> lemma Oops2_not_AKcryptSK: "\ evs \ kerbIV;
Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs \<rbrakk> \<Longrightarrow> \<not> AKcryptSK servK SK evs" by (blast dest: AKcryptSKI AKcryptSK_not_AKcryptSK)
text\<open>Big simplification law for keys SK that are not crypted by keys in KK
It helps prove three, otherwise hard, facts about keys. These facts are
exploited as simplification laws for analz, andalso"limit the damage" incase of loss of a key to the spy. See ESORICS98.
[simplified by LCP]\<close> lemma Key_analz_image_Key [rule_format (no_asm)]: "evs \ kerbIV \
(\<forall>SK KK. SK \<in> symKeys \<and> KK \<subseteq> -(range shrK) \<longrightarrow>
(\<forall>K \<in> KK. \<not> AKcryptSK K SK evs) \<longrightarrow>
(Key SK \<in> analz (Key`KK \<union> (spies evs))) =
(SK \<in> KK | Key SK \<in> analz (spies evs)))" apply (erule kerbIV.induct) apply (frule_tac [10] Oops_range_spies2) apply (frule_tac [9] Oops_range_spies1) apply (frule_tac [7] Says_tgs_message_form) apply (frule_tac [5] Says_kas_message_form) apply (safe del: impI intro!: Key_analz_image_Key_lemma [THEN impI]) txt\<open>Case-splits for Oops1 and message 5: the negated case simplifies using
the induction hypothesis\<close> apply (case_tac [11] "AKcryptSK authK SK evsO1") apply (case_tac [8] "AKcryptSK servK SK evs5") apply (simp_all del: image_insert
add: analz_image_freshK_simps AKcryptSK_Says shrK_not_AKcryptSK
Oops2_not_AKcryptSK Auth_fresh_not_AKcryptSK
Serv_fresh_not_AKcryptSK Says_Tgs_AKcryptSK Spy_analz_shrK) txt\<open>Fake\<close> apply spy_analz txt\<open>K2\<close> apply blast txt\<open>K3\<close> apply blast txt\<open>K4\<close> apply (blast dest!: authK_not_AKcryptSK) txt\<open>K5\<close> apply (case_tac "Key servK \ analz (spies evs5) ") txt\<open>If servK is compromised then the result follows directly...\<close> apply (simp (no_asm_simp) add: analz_insert_eq Un_upper2 [THEN analz_mono, THEN subsetD]) txt\<open>...therefore servK is uncompromised.\<close> txt\<open>The AKcryptSK servK SK evs5 case leads to a contradiction.\<close> apply (blast elim!: servK_not_AKcryptSK [THEN [2] rev_notE] del: allE ballE) txt\<open>Another K5 case\<close> apply blast txt\<open>Oops1\<close> apply simp apply (blast dest!: AKcryptSK_analz_insert) done
text\<open>First simplification law for analz: no session keys encrypt
authentication keys or shared keys.\<close> lemma analz_insert_freshK1: "\ evs \ kerbIV; K \ authKeys evs \ range shrK;
SesKey \<notin> range shrK \<rbrakk> \<Longrightarrow> (Key K \<in> analz (insert (Key SesKey) (spies evs))) =
(K = SesKey | Key K \<in> analz (spies evs))" apply (frule authKeys_are_not_AKcryptSK, assumption) apply (simp del: image_insert
add: analz_image_freshK_simps add: Key_analz_image_Key) done
text\<open>Second simplification law for analz: no service keys encrypt any other keys.\<close> lemma analz_insert_freshK2: "\ evs \ kerbIV; servK \ (authKeys evs); servK \ range shrK;
K \<in> symKeys \<rbrakk> \<Longrightarrow> (Key K \<in> analz (insert (Key servK) (spies evs))) =
(K = servK | Key K \<in> analz (spies evs))" apply (frule not_authKeys_not_AKcryptSK, assumption, assumption) apply (simp del: image_insert
add: analz_image_freshK_simps add: Key_analz_image_Key) done
text\<open>Third simplification law for analz: only one authentication key encrypts a certain service key.\<close>
text\<open>If Spy sees the Authentication Key sent in msg K2, then
the Key has expired.\<close> lemma Confidentiality_Kas_lemma [rule_format]: "\ authK \ symKeys; A \ bad; evs \ kerbIV \ \<Longrightarrow> Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta,
Crypt (shrK Tgs) \<lbrace>Agent A, Agent Tgs, Key authK, Number Ta\<rbrace>\<rbrace>) \<in> set evs \<longrightarrow>
Key authK \<in> analz (spies evs) \<longrightarrow>
expiredAK Ta evs" apply (erule kerbIV.induct) apply (frule_tac [10] Oops_range_spies2) apply (frule_tac [9] Oops_range_spies1) apply (frule_tac [7] Says_tgs_message_form) apply (frule_tac [5] Says_kas_message_form) apply (safe del: impI conjI impCE) apply (simp_all (no_asm_simp) add: Says_Kas_message_form less_SucI analz_insert_eq not_parts_not_analz analz_insert_freshK1 pushes) txt\<open>Fake\<close> apply spy_analz txt\<open>K2\<close> apply blast txt\<open>K4\<close> apply blast txt\<open>Level 8: K5\<close> apply (blast dest: servK_notin_authKeysD Says_Kas_message_form intro: less_SucI) txt\<open>Oops1\<close> apply (blast dest!: unique_authKeys intro: less_SucI) txt\<open>Oops2\<close> apply (blast dest: Says_Tgs_message_form Says_Kas_message_form) done
lemma Confidentiality_Kas: "\ Says Kas A
(Crypt Ka \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace>) \<in> set evs; \<not> expiredAK Ta evs;
A \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key authK \<notin> analz (spies evs)" by (blast dest: Says_Kas_message_form Confidentiality_Kas_lemma)
text\<open>If Spy sees the Service Key sent in msg K4, then
the Key has expired.\<close>
text\<open>In the real world Tgs can't check wheter authK is secure!\<close> lemma Confidentiality_Tgs: "\ Says Tgs A
(Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs;
Key authK \<notin> analz (spies evs); \<not> expiredSK Ts evs;
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key servK \<notin> analz (spies evs)" by (blast dest: Says_Tgs_message_form Confidentiality_lemma)
text\<open>In the real world Tgs CAN check what Kas sends!\<close> lemma Confidentiality_Tgs_bis: "\ Says Kas A
(Crypt Ka \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace>) \<in> set evs;
Says Tgs A
(Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs; \<not> expiredAK Ta evs; \<not> expiredSK Ts evs;
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key servK \<notin> analz (spies evs)" by (blast dest!: Confidentiality_Kas Confidentiality_Tgs)
text\<open>Most general form\<close> lemmas Confidentiality_Tgs_ter = authTicket_authentic [THEN Confidentiality_Tgs_bis]
text\<open>Needs a confidentiality guarantee, hence moved here.
Authenticity of servK for A\<close> lemma servK_authentic_bis_r: "\ Crypt (shrK A) \Key authK, Agent Tgs, Number Ta, authTicket\ \<in> parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs); \<not> expiredAK Ta evs; A \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow>Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs" by (blast dest: authK_authentic Confidentiality_Auth_A servK_authentic_ter)
lemma Confidentiality_Serv_A: "\ Crypt (shrK A) \Key authK, Agent Tgs, Number Ta, authTicket\ \<in> parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs); \<not> expiredAK Ta evs; \<not> expiredSK Ts evs;
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key servK \<notin> analz (spies evs)" apply (drule authK_authentic, assumption, assumption) apply (blast dest: Confidentiality_Kas Says_Kas_message_form servK_authentic_ter Confidentiality_Tgs_bis) done
lemma Confidentiality_B: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace> \<in> parts (spies evs); \<not> expiredSK Ts evs; \<not> expiredAK Ta evs;
A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key servK \<notin> analz (spies evs)" apply (frule authK_authentic) apply (frule_tac [3] Confidentiality_Kas) apply (frule_tac [6] servTicket_authentic, auto) apply (blast dest!: Confidentiality_Tgs_bis dest: Says_Kas_message_form servK_authentic unique_servKeys unique_authKeys) done (* The proof above is fast. It can be done in one command in 17 secs: apply (blast dest: authK_authentic servK_authentic Says_Kas_message_form servTicket_authentic unique_servKeys unique_authKeys Confidentiality_Kas Confidentiality_Tgs_bis) It is very brittle: we can't use this command partway through the script above.
*)
lemma u_Confidentiality_B: "\ Crypt (shrK B) \Agent A, Agent B, Key servK, Number Ts\ \<in> parts (spies evs); \<not> expiredSK Ts evs;
A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Key servK \<notin> analz (spies evs)" by (blast dest: u_servTicket_authentic u_NotexpiredSK_NotexpiredAK Confidentiality_Tgs_bis)
subsection\<open>Parties authentication: each party verifies "the identity of
another party who generated some data" (quoted from Neuman and Ts'o).\
text\<open>These guarantees don't assess whether two parties agree on
the same session key: sending a message containing a key
doesn't a priori state knowledge of the key.\
text\<open>\<open>Tgs_authenticates_A\<close> can be found above\<close>
lemma A_authenticates_Tgs: "\ Says Kas A
(Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace>) \<in> set evs;
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Key authK \<notin> analz (spies evs);
evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says Tgs A (Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace>) \<in> set evs" apply (frule Says_Kas_message_form, assumption) apply (erule rev_mp) apply (erule rev_mp) apply (erule rev_mp) apply (erule kerbIV.induct, analz_mono_contra) apply (frule_tac [7] K5_msg_in_parts_spies) apply (frule_tac [5] K3_msg_in_parts_spies, simp_all, blast) txt\<open>K2\<close> apply (blast dest!: servK_authentic Says_Tgs_message_form authKeys_used) txt\<open>K4\<close> apply (blast dest!: unique_CryptKey) done
lemma B_authenticates_A: "\ Crypt servK \Agent A, Number T3\ \ parts (spies evs);
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<in> parts (spies evs);
Key servK \<notin> analz (spies evs);
A \<notin> bad; B \<notin> bad; B \<noteq> Tgs; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says A B \<lbrace>Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>,
Crypt servK \<lbrace>Agent A, Number T3\<rbrace>\<rbrace> \<in> set evs" by (blast dest: servTicket_authentic_Tgs intro: Says_K5)
text\<open>The second assumption tells B what kind of key servK is.\<close> lemma B_authenticates_A_r: "\ Crypt servK \Agent A, Number T3\ \ parts (spies evs);
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<in> parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace> \<in> parts (spies evs); \<not> expiredSK Ts evs; \<not> expiredAK Ta evs;
B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says A B \<lbrace>Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>,
Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<rbrace> \<in> set evs" by (blast intro: Says_K5 dest: Confidentiality_B servTicket_authentic_Tgs)
text\<open>\<open>u_B_authenticates_A\<close> would be the same as \<open>B_authenticates_A\<close> because the servK confidentiality assumption is yet unrelaxed\<close>
lemma u_B_authenticates_A_r: "\ Crypt servK \Agent A, Number T3\ \ parts (spies evs);
Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace> \<in> parts (spies evs); \<not> expiredSK Ts evs;
B \<noteq> Tgs; A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says A B \<lbrace>Crypt (shrK B) \<lbrace>Agent A, Agent B, Key servK, Number Ts\<rbrace>,
Crypt servK \<lbrace>Agent A, Number T3\<rbrace> \<rbrace> \<in> set evs" by (blast intro: Says_K5 dest: u_Confidentiality_B servTicket_authentic_Tgs)
lemma A_authenticates_B: "\ Crypt servK (Number T3) \ parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace> \<in> parts (spies evs);
Key authK \<notin> analz (spies evs); Key servK \<notin> analz (spies evs);
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says B A (Crypt servK (Number T3)) \<in> set evs" by (blast dest: authK_authentic servK_authentic Says_Kas_message_form Key_unique_SesKey K4_imp_K2 intro: Says_K6)
lemma A_authenticates_B_r: "\ Crypt servK (Number T3) \ parts (spies evs);
Crypt authK \<lbrace>Key servK, Agent B, Number Ts, servTicket\<rbrace> \<in> parts (spies evs);
Crypt (shrK A) \<lbrace>Key authK, Agent Tgs, Number Ta, authTicket\<rbrace> \<in> parts (spies evs); \<not> expiredAK Ta evs; \<not> expiredSK Ts evs;
A \<notin> bad; B \<notin> bad; evs \<in> kerbIV \<rbrakk> \<Longrightarrow> Says B A (Crypt servK (Number T3)) \<in> set evs" apply (frule authK_authentic) apply (frule_tac [3] Says_Kas_message_form) apply (frule_tac [4] Confidentiality_Kas) apply (frule_tac [7] servK_authentic) prefer 8 apply blast apply (erule_tac [9] exE) apply (frule_tac [9] K4_imp_K2) apply assumption+ apply (blast dest: Key_unique_SesKey intro!: Says_K6 dest: Confidentiality_Tgs
) done
subsection\<open>Key distribution guarantees
An agent knows a session key if he used it to issue a cipher.
These guarantees also convey a stronger form of
authentication - non-injective agreement on the session key\<close>
lemma Kas_Issues_A: "\ Says Kas A (Crypt (shrK A) \Key authK, Peer, Ta, authTicket\) \ set evs;
--> --------------------
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.