Dolev-Yao-Star
Collection
LLMs and Datasets for automating Dolev-Yao-Star proof generation.
•
1 item
•
Updated
messages
listlengths 3
3
|
|---|
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nAAA Mobile IP\n\nMN, FA, AAAL, AAAH, HA : principal\nN_FA : nonce\nK_MnAAAH, K_FaAAAL, K_AAAHAAAL, K_AAAHHa : symkey\nK_MnFa, K_MnHa, K_FaHa : fresh symkey\n\n1. FA -> MN : FA, N_FA\n2. MN -> FA : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n3. FA -> AAAL : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n4. AAAL -> AAAH : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n5. AAAH -> HA : MN, {K_MnHa, K_FaHa}K_AAAHHa, {K_MnFa, K_MnHa}K_MnAAAH, {MN, {K_MnHa, K_FaHa}K_AAAHHa, {K_MnFa, K_MnHa}K_MnAAAH}K_AAAHHa\n6. HA -> AAAH : {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {{K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_AAAHHa\n7. AAAH -> AAAL : N_FA, {K_MnFa, K_FaHa}K_AAAHAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {N_FA, {K_MnFa, K_FaHa}K_AAAHAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_AAAHAAAL\n8. AAAL -> FA : N_FA, {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {N_FA, {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_FaAAAL\n9. FA -> MN : {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nAmended Needham Schroeder Symmetric Key\n\nA, B, S : principal \n Na, Nb : number \n Kas, Kbs, Kab : key \n dec : number -> number \n\n1. A -> B : A \n 2. B -> A : {A, Nb}Kbs \n 3. A -> S : A, B, Na, {A, Nb}Kbs \n 4. S -> A : {Na, B, Kab, {Kab, Nb, A}Kbs}Kas \n 5. A -> B : {Kab, Nb, A}Kbs \n 6. B -> A : {Nb}Kab \n 7. A -> B : {dec(Nb)}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nAndrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, {Na}Kab \n 2. B -> A : {succNa, Nb}Kab \n 3. A -> B : {succNb}Kab \n 4. B -> A : {K'ab, N'b}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBAN concrete Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, Na \n 2. B -> A : {Na, K'ab}Kab \n 3. A -> B : {Na}K'ab \n 4. B -> A : Nb"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBAN modified Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, {Na}Kab \n 2. B -> A : {succNa, Nb}Kab \n 3. A -> B : {succNb}Kab \n 4. B -> A : {K'ab, N'b, Na}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBAN modified version of CCITT X.509 (3)\n\nA, B : principal \n Na, Nb : nonce \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Na, B, Xa, {Ya}PK(B)}SK(A) \n 2. B -> A : B, {Nb, A, Na, Xb, {Yb}PK(A)}SK(B) \n 3. A -> B : A, {B, Nb}SK(A)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBAN simplified version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, Nb, {A, Na}Kbs \n 3. S -> A : Nb, {B, Kab, Na}Kas, {A, Kab, Nb}Kbs \n 4. A -> B : {A, Kab, Nb}Kbs, {Nb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBilateral Key Exchange with Public Key Protocol\n\nA, B : principal\nKa, Kb : public key of A and B\nK : shared symmetric key\nNa, Nb : nonce\nf : nonce -> msg\n\n1. B -> A : B, E(Ka : Nb, B)\n2. A -> B : E(Kb : f(Nb), Na, A, K)\n3. B -> A : E(Kb : f(Na))"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nBull's Authentication Protocol\n\nA, B, C, S : principal \n Kab, Kbc : fresh symkey \n Na, Nb, Nc : fresh number \n Kas, Kbs, Kcs : symkey \n h : message, symkey -> message \n A computes Xa = h((A,B,Na),Kas), (A,B,Na) \n\n1. A -> B : Xa \n B computes Xb = h((B,C,Nb,Xa),Kbs), (B,C,Nb,Xa)\n 2. B -> C : Xb \n C computes Xc = h((C,S,Nc,Xb),Kcs), (C,S,Nc,Xb)\n 3. C -> S : Xc \n 4. S -> C : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab, \n B, A, Kab xor h(Nb,Kbs), {B,A,Nb}Kab, \n B, C, Kbc xor h(Nb,Kbs), {B,C,Nb}Kbc, \n C, B, Kbc xor h(Nc,Kcs), {C,B,Nc}Kbc \n 5. C -> B : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab, \n B, A, Kab xor h(Nb,Kbs), {B,A,Nb}Kab, \n B, C, Kbc xor h(Nb,Kbs), {B,C,Nb}Kbc \n 6. B -> A : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nCAM\n\nM,C : principal \n Tm : timestamp \n PK,SK : principal -> key (keypair) \n HoA : principal -> address \n CoA : principal -> address \n i : salt \n\n1. M -> C : CoA(M), HoA(C), HoA(M), PK(M), i, Tm, \n {H(CoA(M), HoA(C), HoA(M), Tm)}SK(M) \n HostPart(HoA(M)) = H(PK(M), i)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nCCITT X.509 (1)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya}PK(B)}SK(A)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nCCITT X.509 (1c)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n h : userdata -> userdata (one-way) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya, {h(Ya)}SK(A)}PK(B)}SK(A)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nCCITT X.509 (3)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya}PK(B)}SK(A) \n 2. B -> A : B, {Tb, Nb, A, Na, Xb, {Yb}PK(A)}SK(B) \n 3. A -> B : A, {Nb}SK(A)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nClark and Jacob modified Hwang and Chen modified SPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, S, pk(S)}sk(AS) \n 3. C -> S : C, S, {T, L, {C, N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, C, pk(C)}sk(AS) \n 6. S -> C : S, C, {inc(N2)}pk(C)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nDavis Swick Private Key Certificates Protocol\n\nA, B : principal\nT : trusted translator\nKbt : shared key between B and T\nKat : shared key between A and T\nmsg : message\n\n1. B -> A : E(Kbt : A, msg)\n2. A -> T : E(Kbt : A, msg), B\n3. T -> A : E(Kat : msg, B)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nDenning-Sacco shared key\n\nA, B, S : principal \n Kas, Kbs, Kab : key \n T : timestamp \n\n1. A -> S : A, B \n 2. S -> A : {B, Kab, T, {Kab, A, T}Kbs}Kas \n 3. A -> B : {Kab,A, T}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nDiffie Helman\n\nA, B : principal \n P, G, Xa, Xb : number \n one : -> number \n kap : number, number, number -> number \n\n1. A -> B : P, G \n 2. A -> B : kap(P, G, Xa) \n 3. B -> A : kap(P, G, Xb) \n 4. A -> B : {one()}kap(P, kap(P, G, Xb), Xa)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nEAP-TLS\n\nP, S : principal\nKp, Ks, Kca : public_key\nNp, Ns, PMS : nonce\nVersion, SessionID, CipherSuite, Cipher : text\nSke, Shd, Ccs : text\nH, KeyGen, PRF : hash_func\nalias ClientK = KeyGen(P, Np, Ns, PRF(PMS, Np, Ns))\nalias ServerK = KeyGen(S, Np, Ns, PRF(PMS, Np, Ns))\nalias Finished = H(PRF(PMS, Np, Ns), P, S, Np, Cipher, SessionID)\n\n1. S -> P : request_id\n2. P -> S : respond_id, P\n3. S -> P : start_tls\n4. P -> S : Version, SessionID, Np, CipherSuite\n5. S -> P : Version, SessionID, Ns, Cipher, {S, Ks}inv(Kca), Ske, Shd\n6. P -> S : {P, Kp}inv(Kca), {PMS}Ks, {H(Np, Ns, S, PMS)}inv(Kp), Ccs, {Finished}ClientK\n7. S -> P : Ccs, {Finished}ServerK"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nEAP-TTLS with Tunneled CHAP\n\nP, S : principal\nKs, Kca : public_key\nNp, Ns, PMS : nonce\nVersion, SessionID, CipherSuite, Cipher : text\nShd, Ccs, Txt : text\nUName, ChapRs : text\nH, PRF, CHAP_PRF, Tranc, KeyGen : hash_func\nalias MS = PRF(PMS, Np, Ns)\nalias ClientK = KeyGen(P, Np, Ns, MS)\nalias ServerK = KeyGen(S, Np, Ns, MS)\nalias Finished = H(MS, P, S, Np, Cipher, SessionID)\nalias CHAP_challenge = Tranc(CHAP_PRF(MS, Txt, Np, Ns), 1, 16)\nalias ChapId = Tranc(CHAP_PRF(MS, Txt, Np, Ns), 17, 17)\n\n1. S -> P : request_id\n2. P -> S : respond_id, P\n3. S -> P : start_ttls\n4. P -> S : Version, SessionID, Np, CipherSuite\n5. S -> P : Version, SessionID, Ns, Cipher, {S, Ks}inv(Kca), Shd\n6. P -> S : {PMS}Ks, Ccs, {Finished}ClientK\n7. S -> P : Ccs, {Finished}ServerK\n8. P -> S : {UName, CHAP_challenge, ChapId, ChapRs}ClientK\n9. S -> P : success"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nEncrypted Key Exchange (EKE) Protocol\n\nA, B : principal\nP : password (symmetric key)\nKa : A's randomly generated public key\nR : randomly generated session key\nNa, Nb : nonces\n\n1. A -> B : E(P : Ka)\n2. B -> A : E(P : E(Ka : R))\n3. A -> B : E(R : Na)\n4. B -> A : E(R : Na, Nb)\n5. A -> B : E(R : Nb)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nGJM\n\nA,B,T : principal \n C : msg \n PCS : (principal,msg,principal,principal):msg \n S-SIG : (principal,msg):msg \n TP-SIG : (principal,msg):msg \n resolved,aborted : bool \n abort : msg \n Exchange-1. A -> B : PCS(A,C,B,T) \n Exchange-2. B -> A : PCS(B,C,A,T) \n Exchange-3. A -> B : S-SIG(A,C) \n Exchange-4. B -> A : S-SIG(B,C) \n Abort-1. A -> T : S-SIG(A,[C,A,B,abort]) \n Abort-2. T -> A : if (resolved) then S-SIG(B,C) else\nS-SIG(T,S-SIG(A,[C,A,B,abort])) \n Resolve-A-1. A -> T : [PCS(B,C,A,T),S-SIG(A,C)] \n Resolve-A-2. T -> A : if (aborted) then\nS-SIG(T,S-SIG(A,[C,A,B,abort])) else if (resolved) S-SIG(B,C) else\nTP-SIG(B,C) \n Resolve-B-1. B -> T : [PCS(A,C,B,T),S-SIG(B,C)] \n Resolve-B-2. T -> B : if (aborted) then\nS-SIG(T,S-SIG(A,[C,A,B,abort])) else if (resolved) S-SIG(A,C) else\nTP-SIG(A,C)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nGeopriv with pseudonym for Location Recipient only\n\nT, LR, LS : principal\nK_T_LR, K_T_LS : symkey\nK_LS : public_key\nN_LR : text\nPsi_LR, PW_LR : text\nK_LR : symkey\nLI : text\nPR : hash_func\n\n1. LR -> T : LR, {LR, N_LR}K_T_LR\n2. LR <- T : Psi_LR, {PW_LR, N_LR}K_T_LR\n3. LS <- T : T, Psi_LR, {PW_LR, T, PR}K_T_LS\n4. LR -> LS : Psi_LR, {PW_LR, K_LR, T}K_LS\n5. LR <- LS : {PR(LI), T}K_LR"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nGeopriv with pseudonyms for Location Recipient and Target\n\nT, LR, LS : principal\nK_T_LR : symkey\nK_LS : public_key\nN_LR : text\nPsi_LR, Psi_T : text\nK_LR : symkey\nLI : text\nPR : hash_func\n\n1. LR -> T : LR, {LR, K_LR, N_LR}K_T_LR\n2. LR <- T : {Psi_LR, Psi_T, N_LR}K_T_LR\n3. LS <- T : {Psi_LR, Psi_T, PR, LI, K_LR}K_LS\n4. LR -> LS : {Psi_LR, Psi_T}K_LS\n5. LR <- LS : {PR(LI), Psi_T}K_LR"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nGong\n\nA, B, S : principal \n Na, Nb, Ns : number \n Pa, Pb : number \n K, Ha, Hb : number \n f1 : number, number, number, number -> number \n f2 : number, number, number, number -> number \n f3 : number, number, number, number -> number \n g : number, number, number, number -> number \n xor : number,number -> number \n alias K = f1(Ns,Na,B,Pa) \n alias Ha = f2(Ns,Na,B,Pa) \n alias Hb = f3(Ns,Na,B,Pa) \n\n1. A -> B : A, B, Na \n 2. B -> S : A, B, Na, Nb \n 3. S -> B : Ns, xor(f1(Ns, Nb, A, Pb), K), \n xor(f2(Ns, Nb, A, Pb), Ha), \n xor(f3(Ns, Nb, A, Pb), Hb), \n g(K, Ha, Hb, Pb) \n 4. B -> A : Ns, Hb \n 5. A -> B : Ha"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nH.530 Symmetric Security for H.323 Mobility (Fixed)\n\nMT, VGK, AuF : principal\nZZ, ZZ_VA : symkey\nX, Y : nonce\nCH1, CH2, CH3, CH4 : nonce\nNIL, G : text\nF : hash_func\nexp : text, nonce -> message\nalias M1 = MT, VGK, NIL, CH1, exp(G, X)\nalias M2 = M1, F(ZZ, M1), VGK, xor(exp(G, X), exp(G, Y))\nalias M3 = VGK, MT, F(ZZ, VGK), F(ZZ, xor(exp(G, X), exp(G, Y))), xor(exp(G, X), exp(G, Y))\nalias M4 = VGK, MT, CH1, CH2, exp(G, Y), F(ZZ, xor(exp(G, X), exp(G, Y))), F(ZZ, VGK)\nalias M5 = MT, VGK, CH2, CH3\nalias M6 = VGK, MT, CH3, CH4\n\n1. MT -> VGK : M1, F(ZZ, M1)\n2. VGK -> AuF : M2, F(ZZ_VA, M2)\n3. AuF -> VGK : M3, F(ZZ_VA, M3)\n4. VGK -> MT : M4, F(exp(exp(G, X), Y), M4)\n5. MT -> VGK : M5, F(exp(exp(G, X), Y), M5)\n6. VGK -> MT : M6, F(exp(exp(G, X), Y), M6)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nH.530 Symmetric Security for H.323 Mobility (Original)\n\nMT, VGK, AuF : principal\nZZ, ZZ_VA : symkey\nX, Y : nonce\nCH1, CH2, CH3, CH4 : nonce\nNIL, G : text\nF : hash_func\nexp : text, nonce -> message\nalias M1 = MT, VGK, NIL, CH1, exp(G, X)\nalias M2 = M1, F(ZZ, M1), VGK, xor(exp(G, X), exp(G, Y))\nalias M3 = VGK, MT, F(ZZ, VGK), F(ZZ, xor(exp(G, X), exp(G, Y)))\nalias M4 = VGK, MT, CH1, CH2, exp(G, Y), F(ZZ, xor(exp(G, X), exp(G, Y))), F(ZZ, VGK)\nalias M5 = MT, VGK, CH2, CH3\nalias M6 = VGK, MT, CH3, CH4\n\n1. MT -> VGK : M1, F(ZZ, M1)\n2. VGK -> AuF : M2, F(ZZ_VA, M2)\n3. AuF -> VGK : M3, F(ZZ_VA, M3)\n4. VGK -> MT : M4, F(exp(exp(G, X), Y), M4)\n5. MT -> VGK : M5, F(exp(exp(G, X), Y), M5)\n6. VGK -> MT : M6, F(exp(exp(G, X), Y), M6)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nHwang and Chen modified SPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, S, pk(S)}sk(AS) \n 3. C -> S : C, S, {C, T, L, {N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, C, pk(C)}sk(AS) \n 6. S -> C : S, C, {S, inc(N2)}pk(C)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nHwang modified version of Neumann Stubblebine\n\nA, B, S : principal \n Na, Ma, Nb, Mb : number \n Kas, Kbs, Kab : key \n Ta, Tb : time \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Tb, Nb}Kbs \n 3. S -> A : {B, Na, Kab, Tb}Kas, {A, Kab, Tb}Kbs, Nb \n 4. A -> B : {A, Kab, Tb}Kbs, {Nb}Kab \n 5. A -> B : Ma, {A, Kab, Tb}Kbs \n 6. B -> A : Mb, {Mb}Kab \n 7. A -> B : {Mb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nIEEE 802.1X EAPOL over RADIUS\n\nC, A, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nChall_Message : text\nSuccess : text\nEAPOL_Start, EAPOL_Req_Identity, EAPOL_Success, Access_accept : text\nMD5 : hash_func\n\n1. C -> A : EAPOL_Start\n2. A -> C : EAPOL_Req_Identity\n3. C -> A : NAS_ID, NAS_PORT, MD5(Kcs)\n4. A -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n5. S -> A : NAS_ID, Chall_Message\n6. A -> C : NAS_ID, Chall_Message\n7. C -> A : NAS_ID, {Chall_Message}Kcs\n8. A -> S : NAS_ID, {Chall_Message}Kcs\n9. S -> A : NAS_ID, Access_accept\n10. A -> C : EAPOL_Success\n11. C -> A : NAS_ID, Success"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Five-Pass Authentication Protocol\n\nA, B, S : principal\nKab : session symkey\nKas, Kbs : long-term symkeys\nRa, Rb, R'b : nonce\nText1, Text2, Text3, Text4, Text5, Text6, Text7, Text8, Text9 : text\n\n1. A -> B : Ra, Text1\n2. B -> S : R'b, Ra, A, Text2\n3. S -> B : Text5, {B, Kab, Ra, Text3}Kas, {A, Kab, R'b, Text4}Kbs\n4. B -> A : Text7, {B, Kab, Ra, Text3}Kas, {Ra, Rb, Text6}Kab\n5. A -> B : Text9, {Ra, Rb, Text8}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO One-Pass Unilateral Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nNa : nonce\nfKab : keyed cryptographic check function\ntext1, text2 : text messages\n\n1. A -> B : [Ta|Na], B, text2, fKab([Ta|Na], B, text1)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Public Key One-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKa-1 : private key of A\nNa : nonce\nCertA : certificate of A\ntext1, text2 : text\n\n1. A -> B : CertA, [Ta|Na], B, text2, E(Ka-1: [Ta|Na], B, text1)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Public Key Three-Pass Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nRa, Rb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4, text5 : text\n\n1. B -> A : Rb, text1\n2. A -> B : CertA, Ra, Rb, B, text3, E(Ka-1: Rb, Ra, B, text2)\n3. B -> A : CertB, Rb, Ra, A, text5, E(Kb-1: Rb, Ra, A, text4)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nTa, Tb : timestamps\nNa, Nb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4 : text\n\n1. A -> B : CertA, [Ta|Na], B, text2, E(Ka-1: [Ta|Na], B, text1)\n2. B -> A : CertB, [Tb|Nb], A, text4, E(Kb-1: [Tb|Nb], A, text3)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Parallel Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nRa, Rb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4, text5, text6 : text\n\n1. A -> B : CertA, Ra, text1\n2. B -> A : Rb, Ra, A, text6, E(Kb-1: Rb, Ra, A, text5)\n3. B -> A : CertB, Rb, text2\n4. A -> B : Ra, Rb, B, text4, E(Ka-1: Rb, Ra, B, text3)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKa-1 : private key of A\nrA, rB : random numbers (nonces)\nCertA : certificate of A\ntext1, text2, text3 : text\n\n1. B -> A : rB, text1\n2. A -> B : CertA, rA, rB, B, text3, E(Ka-1: rB, rA, B, text2)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Symmetric Key One-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKab : symkey\nNa : nonce\ntext1, text2 : text\n\n1. A -> B : text2, {Ta | Na, B, text1}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Symmetric Key Three-Pass Mutual Authentication Protocol\n\nA, B : principal\nKab : symkey\nRa, Rb : nonce\ntext1, text2, text3, text4, text5 : text\n\n1. B -> A : Rb, text1\n2. A -> B : text3, {Ra, Rb, B, text2}Kab\n3. B -> A : text5, {Ra, Rb, text4}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Symmetric Key Two-Pass Mutual Authentication Protocol\n\nA, B : principal\nKab : symkey\nNa, Nb : nonce\ntext1, text2, text3, text4 : text\n\n1. A -> B : text2, {Na, B, text1}Kab\n2. B -> A : text4, {Nb, A, text3}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Symmetric Key Two-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKab : symkey\nRb : nonce\ntext1, text2, text3 : text\n\n1. B -> A : Rb, text1\n2. A -> B : text3, {Rb, B, text2}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Three-Pass Mutual Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nRa, Rb : nonces generated by A and B respectively\nfKab : keyed cryptographic check function\ntext1, text2, text3, text4, text5 : text messages\n\n1. B -> A : Rb, text1\n2. A -> B : Ra, text3, fKab(Ra, Rb, B, text2)\n3. B -> A : text5, fKab(Rb, Ra, A, text4)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Two-Pass Mutual Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nNa, Nb : nonces generated by A and B respectively\nfKab : keyed cryptographic check function\ntext1, text2, text3, text4 : text messages\n\n1. A -> B : [Ta|Na], text2, fKab([Ta|Na], B, text1)\n2. B -> A : [Ta|Na], text4, fKab([Tb|Nb], A, text3)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nISO Two-Pass Unilateral Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nRb : random nonce generated by B\nfKab : keyed cryptographic check function\ntext1, text2, text3 : text messages\n\n1. B -> A : Rb, text1\n2. A -> B : text3, fKab(Rb, B, text2)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nIdemix Anonymous Credential\n\nUser, Issuer, Verifier : principal\nNu, Ns, NuPrime, NsPrime : nonce\nmasec : master_secret\nK_ptag, K_spk : fresh symkey\n\n1. User -> Issuer : commit(masec, Issuer, Nu)\n2. Issuer -> User : credential(Issuer, ptag(masec, Issuer, Nu, Ns), attributes)\n3. User -> Verifier : ptag(masec, Verifier, NuPrime, NsPrime), spk(masec, public_values, statement, message)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nKSL\n\nA, B, S : principal \n Na, Nb, Nc, Ma, Mb : number \n Kas, Kbs, Kab, Kbb : key \n Tb : generalizedTimestamp \n\n1. A -> B : Na, A \n 2. B -> S : Na, A, Nb, B \n 3. S -> B : {Nb, A, Kab}Kbs, {Na, B, Kab}Kas \n 4. B -> A : {Na, B, Kab}Kas, {Tb, A, Kab}Kbb, Nc, {Na}Kab \n 5. A -> B : {Nc}Kab \n 6. A -> B : Ma, {Tb, A, Kab}Kbb \n 7. B -> A : Mb, {Ma}Kab \n 8. A -> B : {Mb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nKao Chow Authentication v.1\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab}Kas, {A, B, Na, Kab}Kbs \n 3. B -> A : {A, B, Na, Kab}Kas, {Na}Kab, Nb \n 4. A -> B : {Nb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nKao Chow Authentication v.2\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab, Kt}Kas, {A, B, Na, Kab, Kt}Kbs \n 3. B -> A : B, {A, B, Na, Kab, Kt}Kas, {Na, Kab}Kt, Nb \n 4. A -> B : {Nb, Kab}Kt"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nKao Chow Authentication v.3\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab, Kt}Kas, {A, B, Na, Kab, Kt}Kbs \n 3. B -> A : {A, B, Na, Kab, Kt}Kas, {Na, Kab}Kt, Nb, {A, B, Ta,\nKab}Kbs \n 4. A -> B : {Nb, Kab}Kt, {A, B, Ta, Kab}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nKerberos V5\n\nA, G, C, S, U : principal \n N1, N2 : nonce \n L1, L2 : nonce \n T1start, T1expire : timestamp \n T2start, T2expire : timestamp \n Kcg, Kcs, Kag, Ku, Kgs : key \n\n1. C -> A : U, G, L1, N1 \n 2. A -> C : U, {U, C, G, Kcg, T1start, T1expire}Kag, \n {G, Kcg, T1start, T1expire}Ku \n 3. C -> G : S, L2, N2, {U, C, G, Kcg, T1start, T1expire}Kag, \n {C, T1}Kcg \n 4. G -> C : U, {U, C, S, Kcs, T2start, T2expire}Kgs, \n {S, Kcs, T2start, T2expire, N2}Kcg \n 5. C -> S : {U, C, S, Kcs, T2start, T2expire}Kgs, \n {C, T2}Kcs \n 6. S -> C : {T2}Kcs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe modified BAN concrete Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, Na \n 2. B -> A : {Na, K'ab, B}Kab \n 3. A -> B : {Na}K'ab \n 4. B -> A : Nb"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe modified Denning-Sacco shared key\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs, Kab : key \n T : timestamp \n dec : nonce -> nonce \n\n1. A -> S : A, B \n 2. S -> A : {B, Kab, T, {Kab, A, T}Kbs}Kas \n 3. A -> B : {Kab,A, T}Kbs \n 4. B -> A : {Nb}Kab \n 5. A -> B : {dec(Nb)}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe modified KSL\n\nA, B, S : principal \n Na, Nb, Nc, Ma, Mb : number \n Kas, Kbs, Kab, Kbb : key \n Tb : generalizedTimestamp \n\n1. A -> B : Na, A \n 2. B -> S : Na, A, Nb, B \n 3. S -> B : {A, Nb Kab}Kbs, {Na, B, Kab}Kas \n 4. B -> A : {Na, B, Kab}Kas, {Tb, A, Kab}Kbb, Nc, {B, Na}Kab \n 5. A -> B : {Nc}Kab \n 6. A -> B : Ma, {Tb, A, Kab}Kbb \n 7. B -> A : Mb, {Ma, B}Kab \n 8. A -> B : {A, Mb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe modified Wide Mouthed Frog\n\nA, S : principal \n Kas, Kbs, Kab : symkey \n Nb : nonce \n Ta, Ts : timestamp \n suc : nonce -> nonce \n\n1. A -> S : A, {Ta, B, Kab}Kas \n 2. S -> B : {Ts, A, Kab}Kbs \n 3. B -> A : {Nb}Kab \n 4. A -> B : {succ(Nb)}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe's fixed version of Needham-Schroder Public Key\n\nA,B,S : Principal \n Na,Nb : Nonce \n KPa,KPb,KPs,KSa,KSb,KSs : Key \n KPa,KSa : is a key pair \n KPb,KSb : is a key pair \n KPs,KSs : is a key pair \n\n1. A -> S : A,B \n 2. S -> A : {KPb, B}KSs \n 3. A -> B : {Na, A}KPb \n 4. B -> S : B,A \n 5. S -> B : {KPa, A}KSs \n 6. B -> A : {Na, Nb, B}KPa \n 7. A -> B : {Nb}KPb"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nLowe's modified version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : {A, Na, Nb}Kbs \n 3. S -> A : {B, Kab, Na, Nb}Kas \n 4. S -> B : {A, Kab}Kbs \n 5. A -> B : {A, B, S, Nb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nNeedham Schroeder Symmetric Key\n\nA, B, S : principal \n Na, Nb : nonce \n Kas, Kbs, Kab : key \n dec : nonce -> nonce \n\n1. A -> S : A, B, Na \n 2. S -> A : {Na, B, Kab, {Kab, A}Kbs}Kas \n 3. A -> B : {Kab,A}Kbs \n 4. B -> A : {Nb}Kab \n 5. A -> B : {dec(Nb)}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nNeedham-Schroeder Public Key\n\nA,B,S : Principal \n Na,Nb : Nonce \n KPa,KPb,KPs,KSa,KSb,KSs : Key \n KPa,KSa : is a key pair \n KPb,KSb : is a key pair \n KPs,KSs : is a key pair \n\n1. A -> S : A,B \n 2. S -> A : {KPb, B}KSs \n 3. A -> B : {Na, A}KPb \n 4. B -> S : B,A \n 5. S -> B : {KPa, A}KSs \n 6. B -> A : {Na, Nb}KPa \n 7. A -> B : {Nb}KPb"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nNeumann Stubblebine\n\nA, B, S : principal \n Na, Ma, Nb, Mb : number \n Kas, Kbs, Kab : key \n Ta, Tb : time \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Tb}Kbs, Nb \n 3. S -> A : {B, Na, Kab, Tb}Kas, {A, Kab, Tb}Kbs, Nb \n 4. A -> B : {A, Kab, Tb}Kbs, {Nb}Kab \n 5. A -> B : Ma, {A, Kab, Tb}Kbs \n 6. B -> A : Mb, {Ma}Kab \n 7. A -> B : {Mb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nOtway Rees\n\nA, B, S : principal \n M, Na, Nb : nonce \n Kas, Kbs, Kab : key \n\n1. A -> B : M, A, B, {Na, M, A, B}Kas \n 2. B -> S : M, A, B, {Na, M, A, B}Kas , {Nb, M, A, B}Kbs \n 3. S -> B : M, {Na, Kab}Kas, {Nb, Kab}Kbs \n 4. B -> A : M, {Na, Kab}Kas"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nPEAP with MS-CHAP\n\nP, S : principal\nKs, Kca : public_key\nPw : symmetric_key\nNp, Ns, PMS : nonce\nSessionID, CipherSuite : text\nCcs : text\nH1, H2, PRF, KeyGen : hash_func\nalias M = PRF(PMS, Np, Ns)\nalias ClientK = KeyGen(P, Np, Ns, M)\nalias ServerK = KeyGen(S, Np, Ns, M)\nalias Finished = H1(M, P, S, Np, CipherSuite, SessionID)\n\n1. S -> P : id_request\n2. P -> S : P\n3. S -> P : start_peap\n4. P -> S : Np, SessionID, CipherSuite\n5. S -> P : Ns, SessionID, CipherSuite, {S, Ks}inv(Kca)\n6. P -> S : {PMS}Ks, Ccs\n7. S -> P : Ccs, {Finished}ServerK\n8. P -> S : {P}ClientK\n9. S -> P : {Ns}ServerK\n10. P -> S : {Np, H2(Pw, Np, Ns, P)}ClientK\n11. S -> P : {H2(Pw, Np)}ServerK\n12. P -> S : ack_message\n13. S -> P : eap_success"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nPaulson's strengthened version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, Nb, {A, Na}Kbs \n 3. S -> A : Nb, {B, Kab, Na}Kas, {A, B, Kab, Nb}Kbs \n 4. A -> B : {A, B, Kab, Nb}Kbs, {Nb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nRADIUS Remote Authentication Dial In User Service\n\nC, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nSuccess, Failure, Access_accept, Access_reject : text\nMD5 : hash_func\n\n1. C -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n2. S -> C : NAS_ID, Access_accept\n3. C -> S : NAS_ID, Success"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nRADIUS Remote Authentication Dial In User Service (with challenge)\n\nC, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nChall_Message : text\nSuccess, Failure, Access_accept, Access_reject : text\nMD5 : hash_func\n\n1. C -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n2. S -> C : NAS_ID, Chall_Message\n3. C -> S : NAS_ID, {Chall_Message}Kcs\n4. S -> C : NAS_ID, Access_accept\n5. C -> S : NAS_ID, Success"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (IdP-initiated with back channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDaa, IDresolve, Resource, REF : text\n\n1. C -> IdP : C, URI, SP\n2. IdP -> C : SP, IdP, REF\n3. C -> SP : IdP, REF\n4. SP -> IdP : IDresolve, SP, IdP, REF\n5. IdP -> SP : IDresolve, IdP, URI, IDaa, SP, IdP, C, URI\n6. SP -> C : URI, Resource"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (IdP-initiated with front channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDaa, Resource : text\n\n1. C -> IdP : C, URI, SP\n2. IdP -> C : IdP, URI, IDaa, SP, IdP, C, URI\n3. C -> SP : IDaa, IdP, URI, SP, C\n4. SP -> C : URI, Resource"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (SP-initiated with back channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDar, IDaa, IDresolve_1, IDresolve_2, Resource, REF_1, REF_2 : text\n\n1. C -> SP : C, URI\n2. SP -> C : IdP, SP, REF_1\n3. C -> IdP : C, SP, REF_1\n4. IdP -> SP : IDresolve_1, IdP, SP, REF_1\n5. SP -> IdP : IDresolve_1, SP, IdP, IDar, URI\n6. IdP -> C : SP, IdP, REF_2\n7. C -> SP : IdP, REF_2\n8. SP -> IdP : IDresolve_2, SP, IdP, REF_2\n9. IdP -> SP : IDresolve_2, IdP, URI, IDar, {SP, IdP, C, IDaa, URI}inv(KIdP)\n10. SP -> C : URI, Resource"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSAML-based SSO for Google Apps (SP-initiated with front channels, fixed variant)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nID, Resource : text\n\n1. C -> SP : URI\n2. SP -> C : C, IdP, (ID, SP), URI\n3. C -> IdP : C, IdP, (ID, SP), URI\n4. IdP -> C : SP, {SP, C, IdP, ID}inv(KIdP), URI\n5. C -> SP : SP, {SP, C, IdP, ID}inv(KIdP), URI\n6. SP -> C : Resource"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSAML-based SSO for Google Apps (SP-initiated, Google unsafe variant)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nID, Resource : text\n\n1. C -> SP : URI\n2. SP -> C : C, IdP, (ID, SP), URI\n3. C -> IdP : C, IdP, (ID, SP), URI\n4. IdP -> C : SP, {C, IdP}inv(KIdP), URI\n5. C -> SP : SP, {C, IdP}inv(KIdP), URI\n6. SP -> C : Resource"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSIP Diameter Session Initiation Protocol\n\nUAC, SS1, SS2, DS : principal\nNonce : nonce\nPWD : text\nDest : protocol_id\nH : hash_func\nsipregister, sip401, sip200 : protocol_id\n\n1. UAC -> SS1 : sipregister, UAC, Dest\n2. SS1 -> DS : UAC, Dest\n3. DS -> SS1 : UAC, SS2\n4. SS1 -> SS2 : sipregister, UAC, Dest\n5. SS2 -> DS : Dest, UAC\n6. DS -> SS2 : Nonce, UAC\n7. SS2 -> SS1 : sip401, Nonce\n8. SS1 -> UAC : sip401, Nonce\n9. UAC -> SS1 : sipregister, UAC, Dest, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n10. SS1 -> DS : UAC, Dest\n11. DS -> SS1 : UAC, SS2\n12. SS1 -> SS2 : sipregister, UAC, Dest, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n13. SS2 -> DS : Dest, UAC, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n14. DS -> SS2 : UAC, success\n15. SS2 -> SS1 : sip200\n16. SS1 -> UAC : sip200"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSK3\n\nA, B, S, Ca, Cb : principal \n Ka, Kb : symkey \n Kac, Kbc : symkey \n Na, Nb : nonce \n 0,1,2 : number \n alias Kab = {A, 0}Kb \n alias Pab = Kab + {B, 1}Ka \n\n1. A -> S : A, B \n 2. S -> A : Pab, {Pab, B, 2}Ka \n 3. A -> Ca : A \n 4. Ca -> A : Na, {Na, 1, 1}Kac \n 5. A -> B : A, Na \n 6. B -> Cb : A, Na \n 7. Cb -> B : Nb, {Nb, 0, 0}Kab, {Na, Nb, 1}Kab, {Nb, 0, 1}Kab \n 8. B -> A : Nb, {Na, Nb, 1}Kab \n 9. A -> Ca : B, Na, Nb, Pab, {Pab, B, 2}Ka, {Na, Nb, 1}Kab,\n{Nb, 0, 1}Kab \n10. Ca -> A : {Nb, 0, 0}Kab, {Nb, 0, 1}Kab \n11. A -> B : {Nb, 0, 1}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, pk(S)}sk(AS) \n 3. C -> S : C, S, {C, T, L, {N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, pk(C)}sk(AS) \n 6. S -> C : S, C, {S, inc(N2)}pk(C)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSRP: Secure Remote Passwords\n\nA, B: principal (Client, Server)\nPassword: shared secret between A and B\nSalt: random value known to server, used to prevent dictionary attacks\nG: generator for Diffie-Hellman exponentiation\nNa, Nb: nonces generated by A and B respectively\nV: password verifier = g^x mod N, with x = SHA(salt | SHA(A | ':' | Password))\nDHX, DHY: Diffie-Hellman public values\nK: session key derived from DH values and verifier\nM: proof of key, H(A,B,K,...)\n\n1. A -> B: A, G^Na\n2. B -> A: Salt, {G^Nb}_V\n3. A -> B: M\n4. B -> A: H(G^Na, M, K)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSchnorr's Protocol\n\nA, B : principal \n Na, Nb : fresh number \n Sa : private key \n Pa = exp(g,Sa) : public key \n A chooses Na and computes a = exp(g,Na) \n\n1. A -> B : a \n B chooses Nb \n 2. B -> A : Nb \n A computes r = Na + Nb Sa \n 3. A -> B : r \n B checks that exp(g, r) = a exp(Pa,Nb)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nShamir-Rivest-Adleman Three Pass Protocol\n\nA, B : principal \n Ka, Kb : symkey \n M : fresh number \n\n1. A -> B : {M}Ka \n 2. B -> A : {{M}Ka}Kb \n 3. A -> B : {M}Kb"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nSmartRight view-only\n\nCC, TC : principal \n VoKey, VoR, VoRi, CW : number \n Kc : key \n h : number -> number \n\n1. CC -> TC : {VoKey, CW+VoR}Kc \n 2. TC -> CC : VoRi \n 3. CC -> TC : VoR, {h(VoRi)}VoKey"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nTESLA: Timed Efficient Stream Loss-tolerant Authentication\n\nS, R: principal\nK_N: random symmetric key generated by S\nK_i: keys derived from K_N using a one-way function F\nM_i: messages broadcast by S\nN: total number of messages\nF: one-way hash function\ntext: generic message content\n\n1. S -> R: {N, K_0}inv(K_S) where K_0 = F^N(K_N)\n2. For i = 1 to N-1, S -> R: M_i, hash(K_i, M_i), K{i-1}"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nTMN\n\nA, B, S : principal \n Ka, Kb : key \n PK, SK : principal -> key (keypair) \n\n1. A -> S : B, {Ka}PK(S) \n 2. S -> B : A \n 3. B -> S : A, {Kb}PK(S) \n 4. S -> A : B, {Kb}Ka"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nTSIG Transaction Signature\n\nC, S : principal\nK : symkey\nN1, N2 : nonce\nM1, M2 : text\nTAG1, TAG2 : text\nH : hash_func\n\n1. C -> S : TAG1, M1, {H(TAG1, M1), N1}K\n2. S -> C : TAG2, M1, M2, {H(TAG2, M1, M2), N2}K"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nUMTS-AKA: Authentication and Key Agreement\n\nS, M: principal (Server, Mobile)\nk(M): shared secret key between S and M\nseq: sequence number maintained by both S and M\nr: random nonce generated by S\nF1, F2, F3, F4, F5: cryptographic hash or one-way functions\nCK, IK, KA: session keys derived from k(M) and r\nAUTN: authentication token\n\n1. M -> S: M\n2. S -> M: r; {seq}_Ka; F1(k(M); seq; r)\n3. M computes KA, seq, and verifies F1(k(M); seq; r); if valid, increments seq\n4. M -> S: F2(k(M); r)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nUsing Non-reversible Function Protocol\n\nA, B : principal\nKab, K : symkey\nRa, Rb : nonce\nf : randomNo -> msg\n\n1. B -> A : B, Rb\n2. A -> B : A, {f(Rb), Ra, A, K}Kab\n3. B -> A : B, {f(Ra)}K"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWide Mouthed Frog\n\nA, S : principal \n Kas, Kbs, Kab : symkey \n Ta, Ts : timestamp \n\n1. A -> S : A, {Ta, B, Kab}Kas \n 2. S -> B : {Ts, A, Kab}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWired Equivalent Privacy Protocol\n\nA, B : principal \n Kab : symkey \n RC4 : message, symkey -> message \n C : message -> message \n\n1. A -> B : v, ((M,C(M)) xor RC4(v,Kab))"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Mutual Authentication\n\nP, Q, S : principal \n Kps, Kqs, Kpq : key \n N1, N2 : number \n\n1. P -> Q : P, N1 \n 2. Q -> P : Q, N2 \n 3. P -> Q : {P, Q, N1, N2}Kps \n 4. Q -> S : {P, Q, N1, N2}Kps, {P, Q, N1, N2}Kqs \n 5. S -> Q : {Q, N1, N2, Kpq}Kps, {P, N1, N2,Kpq}Kqs \n 6. Q -> P : {Q, N1, N2, Kpq}Kps, {N1, N2}Kpq \n 7. P -> Q : {N2}Kpq"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Pi\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {Nb}Kas \n 4. B -> S : {A, {Nb}Kas}Kbs \n 5. S -> B : {Nb}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Pi 1\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,B,Nb}Kas \n 4. B -> S : {A, B, {A, B, Nb}Kas}Kbs \n 5. S -> B : {A, B, Nb}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Pi 2\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,Nb}Kas \n 4. B -> S : {A, {A, Nb}Kas}Kbs \n 5. S -> B : {A, Nb}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Pi 3\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {Nb}Kas \n 4. B -> S : {A, {Nb}Kas}Kbs \n 5. S -> B : {A, Nb}Kbs"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nWoo and Lam Pi f\n\nA, B, S : principal \n shared : (principal, principal):key \n Nb : nonce \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,B,Nb}shared(A, S) \n 4. B -> S : {A, B, Nb, {A, B, Nb}shared(A, S)}shared(B, S) \n 5. S -> B : {A, B, Nb}shared(B, S)"
},
{
"role": "assistant",
"content": ""
}
] |
[
{
"role": "system",
"content": "You are an expert in formal verification of security protocols."
},
{
"role": "user",
"content": "Analyze the following protocol:\n\nYahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Nb}Kbs \n 3. S -> A : {B, Kab, Na, Nb}Kas, {A, Kab}Kbs \n 4. A -> B : {A, Kab}Kbs, {Nb}Kab"
},
{
"role": "assistant",
"content": ""
}
] |
This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.
The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes:
The dataset is available in two flavours: instruction and conversation.
Each entry in the instruction dataset has the schema:
{"text": "<Protocol Name>\n\n<Protocol Specifications>"}
Each entry in the conversation dataset has the schema:
{
"messages": [
{"role": "system", "content": "You are an expert in formal verification of security protocols."},
{"role": "user", "content": "Analyze the following protocol:\n\n<Protocol Name>\n\n<Protocol Specifications>"},
{"role": "assistant", "content": ""}
]
}
The protocol specifications use a standard notation:
A, B, S: Principals (participants)Na, Nb: Nonces (random values)Ka, Kb: Cryptographic keys{M}K: Message M encrypted with key KA -> B: Message flow from A to BThis dataset is designed for:
All protocols are sourced from:
The original protocol specifications have been:
from datasets import load_dataset
dataset = load_dataset("dassarthak18/spore-protocols", "instruction")
training_args = TrainingArguments(
# your args
)
trainer = SFTTrainer(
model=model,
args=training_args,
train_dataset=dataset['train'],
dataset_text_field="text",
)
@misc{spore,
title = {Security Protocols Open Repository},
author = {{LSV - ENS Paris-Saclay}},
howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}},
note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France}
}
@techreport{wrro72494,
note = {Query date: 14/01/2011},
year = {1997},
title = {A survey of authentication protocol literature: Version 1.0},
type = {Report},
institution = {ARRAY(0x557103a11320)},
publisher = {Citeseer},
keywords = {Authentication. ,Security Protocols},
url = {https://eprints.whiterose.ac.uk/id/eprint/72494/},
author = {Clark, John Andrew and Jacob, Jeremy Lawrence}
}
@inproceedings{Armando2005AVISPA,
author = {Armando, Alessandro and Basin, David and Boichut, Yohan and
Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and
Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and
Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and
Rusinowitch, Michael and Santiago, J. and Turuani, M. and
Vigan\`o, Luca and Vigneron, L.},
title = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications},
booktitle = {Proceedings of Computer Aided Verification (CAV)},
series = {Lecture Notes in Computer Science},
volume = {3576},
pages = {281--285},
year = {2005},
publisher = {Springer},
doi = {10.1007/11513988\_27}
}
@inproceedings{AVANTSSAR2012,
author = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and
Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro},
title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?},
booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)},
series = {IFIP Advances in Information and Communication Technology},
volume = {376},
pages = {68--79},
year = {2012},
publisher = {Springer},
doi = {10.1007/978-3-642-30436-1\_6}
}