Dataset Viewer
Auto-converted to Parquet
messages
listlengths
3
3
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nAAA Mobile IP\n\nMN, FA, AAAL, AAAH, HA : principal\nN_FA : nonce\nK_MnAAAH, K_FaAAAL, K_AAAHAAAL, K_AAAHHa : symkey\nK_MnFa, K_MnHa, K_FaHa : fresh symkey\n\n1. FA -> MN : FA, N_FA\n2. MN -> FA : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n3. FA -> AAAL : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n4. AAAL -> AAAH : N_FA, MN, AAAH, {N_FA, MN, AAAH}K_MnAAAH\n5. AAAH -> HA : MN, {K_MnHa, K_FaHa}K_AAAHHa, {K_MnFa, K_MnHa}K_MnAAAH, {MN, {K_MnHa, K_FaHa}K_AAAHHa, {K_MnFa, K_MnHa}K_MnAAAH}K_AAAHHa\n6. HA -> AAAH : {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {{K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_AAAHHa\n7. AAAH -> AAAL : N_FA, {K_MnFa, K_FaHa}K_AAAHAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {N_FA, {K_MnFa, K_FaHa}K_AAAHAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_AAAHAAAL\n8. AAAL -> FA : N_FA, {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa, {N_FA, {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa}K_FaAAAL\n9. FA -> MN : {K_MnFa, K_FaHa}K_FaAAAL, {K_MnFa, K_MnHa}K_MnAAAH, {{K_MnFa, K_MnHa}K_MnAAAH}K_MnHa" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nAmended Needham Schroeder Symmetric Key\n\nA, B, S : principal \n Na, Nb : number \n Kas, Kbs, Kab : key \n dec : number -> number \n\n1. A -> B : A \n 2. B -> A : {A, Nb}Kbs \n 3. A -> S : A, B, Na, {A, Nb}Kbs \n 4. S -> A : {Na, B, Kab, {Kab, Nb, A}Kbs}Kas \n 5. A -> B : {Kab, Nb, A}Kbs \n 6. B -> A : {Nb}Kab \n 7. A -> B : {dec(Nb)}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nAndrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, {Na}Kab \n 2. B -> A : {succNa, Nb}Kab \n 3. A -> B : {succNb}Kab \n 4. B -> A : {K'ab, N'b}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBAN concrete Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, Na \n 2. B -> A : {Na, K'ab}Kab \n 3. A -> B : {Na}K'ab \n 4. B -> A : Nb" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBAN modified Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, {Na}Kab \n 2. B -> A : {succNa, Nb}Kab \n 3. A -> B : {succNb}Kab \n 4. B -> A : {K'ab, N'b, Na}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBAN modified version of CCITT X.509 (3)\n\nA, B : principal \n Na, Nb : nonce \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Na, B, Xa, {Ya}PK(B)}SK(A) \n 2. B -> A : B, {Nb, A, Na, Xb, {Yb}PK(A)}SK(B) \n 3. A -> B : A, {B, Nb}SK(A)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBAN simplified version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, Nb, {A, Na}Kbs \n 3. S -> A : Nb, {B, Kab, Na}Kas, {A, Kab, Nb}Kbs \n 4. A -> B : {A, Kab, Nb}Kbs, {Nb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBilateral Key Exchange with Public Key Protocol\n\nA, B : principal\nKa, Kb : public key of A and B\nK : shared symmetric key\nNa, Nb : nonce\nf : nonce -> msg\n\n1. B -> A : B, E(Ka : Nb, B)\n2. A -> B : E(Kb : f(Nb), Na, A, K)\n3. B -> A : E(Kb : f(Na))" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nBull's Authentication Protocol\n\nA, B, C, S : principal \n Kab, Kbc : fresh symkey \n Na, Nb, Nc : fresh number \n Kas, Kbs, Kcs : symkey \n h : message, symkey -> message \n A computes Xa = h((A,B,Na),Kas), (A,B,Na) \n\n1. A -> B : Xa \n B computes Xb = h((B,C,Nb,Xa),Kbs), (B,C,Nb,Xa)\n 2. B -> C : Xb \n C computes Xc = h((C,S,Nc,Xb),Kcs), (C,S,Nc,Xb)\n 3. C -> S : Xc \n 4. S -> C : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab, \n B, A, Kab xor h(Nb,Kbs), {B,A,Nb}Kab, \n B, C, Kbc xor h(Nb,Kbs), {B,C,Nb}Kbc, \n C, B, Kbc xor h(Nc,Kcs), {C,B,Nc}Kbc \n 5. C -> B : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab, \n B, A, Kab xor h(Nb,Kbs), {B,A,Nb}Kab, \n B, C, Kbc xor h(Nb,Kbs), {B,C,Nb}Kbc \n 6. B -> A : A, B, Kab xor h(Na,Kas), {A,B,Na}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nCAM\n\nM,C : principal \n Tm : timestamp \n PK,SK : principal -> key (keypair) \n HoA : principal -> address \n CoA : principal -> address \n i : salt \n\n1. M -> C : CoA(M), HoA(C), HoA(M), PK(M), i, Tm, \n {H(CoA(M), HoA(C), HoA(M), Tm)}SK(M) \n HostPart(HoA(M)) = H(PK(M), i)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nCCITT X.509 (1)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya}PK(B)}SK(A)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nCCITT X.509 (1c)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n h : userdata -> userdata (one-way) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya, {h(Ya)}SK(A)}PK(B)}SK(A)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nCCITT X.509 (3)\n\nA, B : principal \n Na, Nb : nonce \n Ta, Tb : timestamp \n Ya, Yb : userdata \n Xa, Xb : userdata \n PK, SK : principal -> key (keypair) \n\n1. A -> B : A, {Ta, Na, B, Xa, {Ya}PK(B)}SK(A) \n 2. B -> A : B, {Tb, Nb, A, Na, Xb, {Yb}PK(A)}SK(B) \n 3. A -> B : A, {Nb}SK(A)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nClark and Jacob modified Hwang and Chen modified SPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, S, pk(S)}sk(AS) \n 3. C -> S : C, S, {T, L, {C, N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, C, pk(C)}sk(AS) \n 6. S -> C : S, C, {inc(N2)}pk(C)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nDavis Swick Private Key Certificates Protocol\n\nA, B : principal\nT : trusted translator\nKbt : shared key between B and T\nKat : shared key between A and T\nmsg : message\n\n1. B -> A : E(Kbt : A, msg)\n2. A -> T : E(Kbt : A, msg), B\n3. T -> A : E(Kat : msg, B)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nDenning-Sacco shared key\n\nA, B, S : principal \n Kas, Kbs, Kab : key \n T : timestamp \n\n1. A -> S : A, B \n 2. S -> A : {B, Kab, T, {Kab, A, T}Kbs}Kas \n 3. A -> B : {Kab,A, T}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nDiffie Helman\n\nA, B : principal \n P, G, Xa, Xb : number \n one : -> number \n kap : number, number, number -> number \n\n1. A -> B : P, G \n 2. A -> B : kap(P, G, Xa) \n 3. B -> A : kap(P, G, Xb) \n 4. A -> B : {one()}kap(P, kap(P, G, Xb), Xa)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nEAP-TLS\n\nP, S : principal\nKp, Ks, Kca : public_key\nNp, Ns, PMS : nonce\nVersion, SessionID, CipherSuite, Cipher : text\nSke, Shd, Ccs : text\nH, KeyGen, PRF : hash_func\nalias ClientK = KeyGen(P, Np, Ns, PRF(PMS, Np, Ns))\nalias ServerK = KeyGen(S, Np, Ns, PRF(PMS, Np, Ns))\nalias Finished = H(PRF(PMS, Np, Ns), P, S, Np, Cipher, SessionID)\n\n1. S -> P : request_id\n2. P -> S : respond_id, P\n3. S -> P : start_tls\n4. P -> S : Version, SessionID, Np, CipherSuite\n5. S -> P : Version, SessionID, Ns, Cipher, {S, Ks}inv(Kca), Ske, Shd\n6. P -> S : {P, Kp}inv(Kca), {PMS}Ks, {H(Np, Ns, S, PMS)}inv(Kp), Ccs, {Finished}ClientK\n7. S -> P : Ccs, {Finished}ServerK" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nEAP-TTLS with Tunneled CHAP\n\nP, S : principal\nKs, Kca : public_key\nNp, Ns, PMS : nonce\nVersion, SessionID, CipherSuite, Cipher : text\nShd, Ccs, Txt : text\nUName, ChapRs : text\nH, PRF, CHAP_PRF, Tranc, KeyGen : hash_func\nalias MS = PRF(PMS, Np, Ns)\nalias ClientK = KeyGen(P, Np, Ns, MS)\nalias ServerK = KeyGen(S, Np, Ns, MS)\nalias Finished = H(MS, P, S, Np, Cipher, SessionID)\nalias CHAP_challenge = Tranc(CHAP_PRF(MS, Txt, Np, Ns), 1, 16)\nalias ChapId = Tranc(CHAP_PRF(MS, Txt, Np, Ns), 17, 17)\n\n1. S -> P : request_id\n2. P -> S : respond_id, P\n3. S -> P : start_ttls\n4. P -> S : Version, SessionID, Np, CipherSuite\n5. S -> P : Version, SessionID, Ns, Cipher, {S, Ks}inv(Kca), Shd\n6. P -> S : {PMS}Ks, Ccs, {Finished}ClientK\n7. S -> P : Ccs, {Finished}ServerK\n8. P -> S : {UName, CHAP_challenge, ChapId, ChapRs}ClientK\n9. S -> P : success" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nEncrypted Key Exchange (EKE) Protocol\n\nA, B : principal\nP : password (symmetric key)\nKa : A's randomly generated public key\nR : randomly generated session key\nNa, Nb : nonces\n\n1. A -> B : E(P : Ka)\n2. B -> A : E(P : E(Ka : R))\n3. A -> B : E(R : Na)\n4. B -> A : E(R : Na, Nb)\n5. A -> B : E(R : Nb)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nGJM\n\nA,B,T : principal \n C : msg \n PCS : (principal,msg,principal,principal):msg \n S-SIG : (principal,msg):msg \n TP-SIG : (principal,msg):msg \n resolved,aborted : bool \n abort : msg \n Exchange-1. A -> B : PCS(A,C,B,T) \n Exchange-2. B -> A : PCS(B,C,A,T) \n Exchange-3. A -> B : S-SIG(A,C) \n Exchange-4. B -> A : S-SIG(B,C) \n Abort-1. A -> T : S-SIG(A,[C,A,B,abort]) \n Abort-2. T -> A : if (resolved) then S-SIG(B,C) else\nS-SIG(T,S-SIG(A,[C,A,B,abort])) \n Resolve-A-1. A -> T : [PCS(B,C,A,T),S-SIG(A,C)] \n Resolve-A-2. T -> A : if (aborted) then\nS-SIG(T,S-SIG(A,[C,A,B,abort])) else if (resolved) S-SIG(B,C) else\nTP-SIG(B,C) \n Resolve-B-1. B -> T : [PCS(A,C,B,T),S-SIG(B,C)] \n Resolve-B-2. T -> B : if (aborted) then\nS-SIG(T,S-SIG(A,[C,A,B,abort])) else if (resolved) S-SIG(A,C) else\nTP-SIG(A,C)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nGeopriv with pseudonym for Location Recipient only\n\nT, LR, LS : principal\nK_T_LR, K_T_LS : symkey\nK_LS : public_key\nN_LR : text\nPsi_LR, PW_LR : text\nK_LR : symkey\nLI : text\nPR : hash_func\n\n1. LR -> T : LR, {LR, N_LR}K_T_LR\n2. LR <- T : Psi_LR, {PW_LR, N_LR}K_T_LR\n3. LS <- T : T, Psi_LR, {PW_LR, T, PR}K_T_LS\n4. LR -> LS : Psi_LR, {PW_LR, K_LR, T}K_LS\n5. LR <- LS : {PR(LI), T}K_LR" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nGeopriv with pseudonyms for Location Recipient and Target\n\nT, LR, LS : principal\nK_T_LR : symkey\nK_LS : public_key\nN_LR : text\nPsi_LR, Psi_T : text\nK_LR : symkey\nLI : text\nPR : hash_func\n\n1. LR -> T : LR, {LR, K_LR, N_LR}K_T_LR\n2. LR <- T : {Psi_LR, Psi_T, N_LR}K_T_LR\n3. LS <- T : {Psi_LR, Psi_T, PR, LI, K_LR}K_LS\n4. LR -> LS : {Psi_LR, Psi_T}K_LS\n5. LR <- LS : {PR(LI), Psi_T}K_LR" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nGong\n\nA, B, S : principal \n Na, Nb, Ns : number \n Pa, Pb : number \n K, Ha, Hb : number \n f1 : number, number, number, number -> number \n f2 : number, number, number, number -> number \n f3 : number, number, number, number -> number \n g : number, number, number, number -> number \n xor : number,number -> number \n alias K = f1(Ns,Na,B,Pa) \n alias Ha = f2(Ns,Na,B,Pa) \n alias Hb = f3(Ns,Na,B,Pa) \n\n1. A -> B : A, B, Na \n 2. B -> S : A, B, Na, Nb \n 3. S -> B : Ns, xor(f1(Ns, Nb, A, Pb), K), \n xor(f2(Ns, Nb, A, Pb), Ha), \n xor(f3(Ns, Nb, A, Pb), Hb), \n g(K, Ha, Hb, Pb) \n 4. B -> A : Ns, Hb \n 5. A -> B : Ha" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nH.530 Symmetric Security for H.323 Mobility (Fixed)\n\nMT, VGK, AuF : principal\nZZ, ZZ_VA : symkey\nX, Y : nonce\nCH1, CH2, CH3, CH4 : nonce\nNIL, G : text\nF : hash_func\nexp : text, nonce -> message\nalias M1 = MT, VGK, NIL, CH1, exp(G, X)\nalias M2 = M1, F(ZZ, M1), VGK, xor(exp(G, X), exp(G, Y))\nalias M3 = VGK, MT, F(ZZ, VGK), F(ZZ, xor(exp(G, X), exp(G, Y))), xor(exp(G, X), exp(G, Y))\nalias M4 = VGK, MT, CH1, CH2, exp(G, Y), F(ZZ, xor(exp(G, X), exp(G, Y))), F(ZZ, VGK)\nalias M5 = MT, VGK, CH2, CH3\nalias M6 = VGK, MT, CH3, CH4\n\n1. MT -> VGK : M1, F(ZZ, M1)\n2. VGK -> AuF : M2, F(ZZ_VA, M2)\n3. AuF -> VGK : M3, F(ZZ_VA, M3)\n4. VGK -> MT : M4, F(exp(exp(G, X), Y), M4)\n5. MT -> VGK : M5, F(exp(exp(G, X), Y), M5)\n6. VGK -> MT : M6, F(exp(exp(G, X), Y), M6)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nH.530 Symmetric Security for H.323 Mobility (Original)\n\nMT, VGK, AuF : principal\nZZ, ZZ_VA : symkey\nX, Y : nonce\nCH1, CH2, CH3, CH4 : nonce\nNIL, G : text\nF : hash_func\nexp : text, nonce -> message\nalias M1 = MT, VGK, NIL, CH1, exp(G, X)\nalias M2 = M1, F(ZZ, M1), VGK, xor(exp(G, X), exp(G, Y))\nalias M3 = VGK, MT, F(ZZ, VGK), F(ZZ, xor(exp(G, X), exp(G, Y)))\nalias M4 = VGK, MT, CH1, CH2, exp(G, Y), F(ZZ, xor(exp(G, X), exp(G, Y))), F(ZZ, VGK)\nalias M5 = MT, VGK, CH2, CH3\nalias M6 = VGK, MT, CH3, CH4\n\n1. MT -> VGK : M1, F(ZZ, M1)\n2. VGK -> AuF : M2, F(ZZ_VA, M2)\n3. AuF -> VGK : M3, F(ZZ_VA, M3)\n4. VGK -> MT : M4, F(exp(exp(G, X), Y), M4)\n5. MT -> VGK : M5, F(exp(exp(G, X), Y), M5)\n6. VGK -> MT : M6, F(exp(exp(G, X), Y), M6)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nHwang and Chen modified SPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, S, pk(S)}sk(AS) \n 3. C -> S : C, S, {C, T, L, {N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, C, pk(C)}sk(AS) \n 6. S -> C : S, C, {S, inc(N2)}pk(C)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nHwang modified version of Neumann Stubblebine\n\nA, B, S : principal \n Na, Ma, Nb, Mb : number \n Kas, Kbs, Kab : key \n Ta, Tb : time \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Tb, Nb}Kbs \n 3. S -> A : {B, Na, Kab, Tb}Kas, {A, Kab, Tb}Kbs, Nb \n 4. A -> B : {A, Kab, Tb}Kbs, {Nb}Kab \n 5. A -> B : Ma, {A, Kab, Tb}Kbs \n 6. B -> A : Mb, {Mb}Kab \n 7. A -> B : {Mb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nIEEE 802.1X EAPOL over RADIUS\n\nC, A, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nChall_Message : text\nSuccess : text\nEAPOL_Start, EAPOL_Req_Identity, EAPOL_Success, Access_accept : text\nMD5 : hash_func\n\n1. C -> A : EAPOL_Start\n2. A -> C : EAPOL_Req_Identity\n3. C -> A : NAS_ID, NAS_PORT, MD5(Kcs)\n4. A -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n5. S -> A : NAS_ID, Chall_Message\n6. A -> C : NAS_ID, Chall_Message\n7. C -> A : NAS_ID, {Chall_Message}Kcs\n8. A -> S : NAS_ID, {Chall_Message}Kcs\n9. S -> A : NAS_ID, Access_accept\n10. A -> C : EAPOL_Success\n11. C -> A : NAS_ID, Success" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Five-Pass Authentication Protocol\n\nA, B, S : principal\nKab : session symkey\nKas, Kbs : long-term symkeys\nRa, Rb, R'b : nonce\nText1, Text2, Text3, Text4, Text5, Text6, Text7, Text8, Text9 : text\n\n1. A -> B : Ra, Text1\n2. B -> S : R'b, Ra, A, Text2\n3. S -> B : Text5, {B, Kab, Ra, Text3}Kas, {A, Kab, R'b, Text4}Kbs\n4. B -> A : Text7, {B, Kab, Ra, Text3}Kas, {Ra, Rb, Text6}Kab\n5. A -> B : Text9, {Ra, Rb, Text8}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO One-Pass Unilateral Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nNa : nonce\nfKab : keyed cryptographic check function\ntext1, text2 : text messages\n\n1. A -> B : [Ta|Na], B, text2, fKab([Ta|Na], B, text1)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Public Key One-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKa-1 : private key of A\nNa : nonce\nCertA : certificate of A\ntext1, text2 : text\n\n1. A -> B : CertA, [Ta|Na], B, text2, E(Ka-1: [Ta|Na], B, text1)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Public Key Three-Pass Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nRa, Rb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4, text5 : text\n\n1. B -> A : Rb, text1\n2. A -> B : CertA, Ra, Rb, B, text3, E(Ka-1: Rb, Ra, B, text2)\n3. B -> A : CertB, Rb, Ra, A, text5, E(Kb-1: Rb, Ra, A, text4)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nTa, Tb : timestamps\nNa, Nb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4 : text\n\n1. A -> B : CertA, [Ta|Na], B, text2, E(Ka-1: [Ta|Na], B, text1)\n2. B -> A : CertB, [Tb|Nb], A, text4, E(Kb-1: [Tb|Nb], A, text3)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Parallel Mutual Authentication Protocol\n\nA, B : principal\nKa-1, Kb-1 : private keys of A and B\nRa, Rb : nonces\nCertA, CertB : certificates of A and B\ntext1, text2, text3, text4, text5, text6 : text\n\n1. A -> B : CertA, Ra, text1\n2. B -> A : Rb, Ra, A, text6, E(Kb-1: Rb, Ra, A, text5)\n3. B -> A : CertB, Rb, text2\n4. A -> B : Ra, Rb, B, text4, E(Ka-1: Rb, Ra, B, text3)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Public Key Two-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKa-1 : private key of A\nrA, rB : random numbers (nonces)\nCertA : certificate of A\ntext1, text2, text3 : text\n\n1. B -> A : rB, text1\n2. A -> B : CertA, rA, rB, B, text3, E(Ka-1: rB, rA, B, text2)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Symmetric Key One-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKab : symkey\nNa : nonce\ntext1, text2 : text\n\n1. A -> B : text2, {Ta | Na, B, text1}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Symmetric Key Three-Pass Mutual Authentication Protocol\n\nA, B : principal\nKab : symkey\nRa, Rb : nonce\ntext1, text2, text3, text4, text5 : text\n\n1. B -> A : Rb, text1\n2. A -> B : text3, {Ra, Rb, B, text2}Kab\n3. B -> A : text5, {Ra, Rb, text4}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Symmetric Key Two-Pass Mutual Authentication Protocol\n\nA, B : principal\nKab : symkey\nNa, Nb : nonce\ntext1, text2, text3, text4 : text\n\n1. A -> B : text2, {Na, B, text1}Kab\n2. B -> A : text4, {Nb, A, text3}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Symmetric Key Two-Pass Unilateral Authentication Protocol\n\nA, B : principal\nKab : symkey\nRb : nonce\ntext1, text2, text3 : text\n\n1. B -> A : Rb, text1\n2. A -> B : text3, {Rb, B, text2}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Three-Pass Mutual Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nRa, Rb : nonces generated by A and B respectively\nfKab : keyed cryptographic check function\ntext1, text2, text3, text4, text5 : text messages\n\n1. B -> A : Rb, text1\n2. A -> B : Ra, text3, fKab(Ra, Rb, B, text2)\n3. B -> A : text5, fKab(Rb, Ra, A, text4)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Two-Pass Mutual Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nNa, Nb : nonces generated by A and B respectively\nfKab : keyed cryptographic check function\ntext1, text2, text3, text4 : text messages\n\n1. A -> B : [Ta|Na], text2, fKab([Ta|Na], B, text1)\n2. B -> A : [Ta|Na], text4, fKab([Tb|Nb], A, text3)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nISO Two-Pass Unilateral Authentication Protocol with CCFs\n\nA, B : principal\nKab : shared key between A and B\nRb : random nonce generated by B\nfKab : keyed cryptographic check function\ntext1, text2, text3 : text messages\n\n1. B -> A : Rb, text1\n2. A -> B : text3, fKab(Rb, B, text2)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nIdemix Anonymous Credential\n\nUser, Issuer, Verifier : principal\nNu, Ns, NuPrime, NsPrime : nonce\nmasec : master_secret\nK_ptag, K_spk : fresh symkey\n\n1. User -> Issuer : commit(masec, Issuer, Nu)\n2. Issuer -> User : credential(Issuer, ptag(masec, Issuer, Nu, Ns), attributes)\n3. User -> Verifier : ptag(masec, Verifier, NuPrime, NsPrime), spk(masec, public_values, statement, message)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nKSL\n\nA, B, S : principal \n Na, Nb, Nc, Ma, Mb : number \n Kas, Kbs, Kab, Kbb : key \n Tb : generalizedTimestamp \n\n1. A -> B : Na, A \n 2. B -> S : Na, A, Nb, B \n 3. S -> B : {Nb, A, Kab}Kbs, {Na, B, Kab}Kas \n 4. B -> A : {Na, B, Kab}Kas, {Tb, A, Kab}Kbb, Nc, {Na}Kab \n 5. A -> B : {Nc}Kab \n 6. A -> B : Ma, {Tb, A, Kab}Kbb \n 7. B -> A : Mb, {Ma}Kab \n 8. A -> B : {Mb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nKao Chow Authentication v.1\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab}Kas, {A, B, Na, Kab}Kbs \n 3. B -> A : {A, B, Na, Kab}Kas, {Na}Kab, Nb \n 4. A -> B : {Nb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nKao Chow Authentication v.2\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab, Kt}Kas, {A, B, Na, Kab, Kt}Kbs \n 3. B -> A : B, {A, B, Na, Kab, Kt}Kas, {Na, Kab}Kt, Nb \n 4. A -> B : {Nb, Kab}Kt" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nKao Chow Authentication v.3\n\nA, B, S : principal \n Na, Nb : number \n Kab, Kbs, Kas : key \n\n1. A -> S : A, B, Na \n 2. S -> B : {A, B, Na, Kab, Kt}Kas, {A, B, Na, Kab, Kt}Kbs \n 3. B -> A : {A, B, Na, Kab, Kt}Kas, {Na, Kab}Kt, Nb, {A, B, Ta,\nKab}Kbs \n 4. A -> B : {Nb, Kab}Kt, {A, B, Ta, Kab}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nKerberos V5\n\nA, G, C, S, U : principal \n N1, N2 : nonce \n L1, L2 : nonce \n T1start, T1expire : timestamp \n T2start, T2expire : timestamp \n Kcg, Kcs, Kag, Ku, Kgs : key \n\n1. C -> A : U, G, L1, N1 \n 2. A -> C : U, {U, C, G, Kcg, T1start, T1expire}Kag, \n {G, Kcg, T1start, T1expire}Ku \n 3. C -> G : S, L2, N2, {U, C, G, Kcg, T1start, T1expire}Kag, \n {C, T1}Kcg \n 4. G -> C : U, {U, C, S, Kcs, T2start, T2expire}Kgs, \n {S, Kcs, T2start, T2expire, N2}Kcg \n 5. C -> S : {U, C, S, Kcs, T2start, T2expire}Kgs, \n {C, T2}Kcs \n 6. S -> C : {T2}Kcs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe modified BAN concrete Andrew Secure RPC\n\nA, B : principal \n Kab, K'ab : symkey \n Na, Nb, N'b : nonce \n succ : nonce -> nonce \n\n1. A -> B : A, Na \n 2. B -> A : {Na, K'ab, B}Kab \n 3. A -> B : {Na}K'ab \n 4. B -> A : Nb" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe modified Denning-Sacco shared key\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs, Kab : key \n T : timestamp \n dec : nonce -> nonce \n\n1. A -> S : A, B \n 2. S -> A : {B, Kab, T, {Kab, A, T}Kbs}Kas \n 3. A -> B : {Kab,A, T}Kbs \n 4. B -> A : {Nb}Kab \n 5. A -> B : {dec(Nb)}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe modified KSL\n\nA, B, S : principal \n Na, Nb, Nc, Ma, Mb : number \n Kas, Kbs, Kab, Kbb : key \n Tb : generalizedTimestamp \n\n1. A -> B : Na, A \n 2. B -> S : Na, A, Nb, B \n 3. S -> B : {A, Nb Kab}Kbs, {Na, B, Kab}Kas \n 4. B -> A : {Na, B, Kab}Kas, {Tb, A, Kab}Kbb, Nc, {B, Na}Kab \n 5. A -> B : {Nc}Kab \n 6. A -> B : Ma, {Tb, A, Kab}Kbb \n 7. B -> A : Mb, {Ma, B}Kab \n 8. A -> B : {A, Mb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe modified Wide Mouthed Frog\n\nA, S : principal \n Kas, Kbs, Kab : symkey \n Nb : nonce \n Ta, Ts : timestamp \n suc : nonce -> nonce \n\n1. A -> S : A, {Ta, B, Kab}Kas \n 2. S -> B : {Ts, A, Kab}Kbs \n 3. B -> A : {Nb}Kab \n 4. A -> B : {succ(Nb)}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe's fixed version of Needham-Schroder Public Key\n\nA,B,S : Principal \n Na,Nb : Nonce \n KPa,KPb,KPs,KSa,KSb,KSs : Key \n KPa,KSa : is a key pair \n KPb,KSb : is a key pair \n KPs,KSs : is a key pair \n\n1. A -> S : A,B \n 2. S -> A : {KPb, B}KSs \n 3. A -> B : {Na, A}KPb \n 4. B -> S : B,A \n 5. S -> B : {KPa, A}KSs \n 6. B -> A : {Na, Nb, B}KPa \n 7. A -> B : {Nb}KPb" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nLowe's modified version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : {A, Na, Nb}Kbs \n 3. S -> A : {B, Kab, Na, Nb}Kas \n 4. S -> B : {A, Kab}Kbs \n 5. A -> B : {A, B, S, Nb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nNeedham Schroeder Symmetric Key\n\nA, B, S : principal \n Na, Nb : nonce \n Kas, Kbs, Kab : key \n dec : nonce -> nonce \n\n1. A -> S : A, B, Na \n 2. S -> A : {Na, B, Kab, {Kab, A}Kbs}Kas \n 3. A -> B : {Kab,A}Kbs \n 4. B -> A : {Nb}Kab \n 5. A -> B : {dec(Nb)}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nNeedham-Schroeder Public Key\n\nA,B,S : Principal \n Na,Nb : Nonce \n KPa,KPb,KPs,KSa,KSb,KSs : Key \n KPa,KSa : is a key pair \n KPb,KSb : is a key pair \n KPs,KSs : is a key pair \n\n1. A -> S : A,B \n 2. S -> A : {KPb, B}KSs \n 3. A -> B : {Na, A}KPb \n 4. B -> S : B,A \n 5. S -> B : {KPa, A}KSs \n 6. B -> A : {Na, Nb}KPa \n 7. A -> B : {Nb}KPb" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nNeumann Stubblebine\n\nA, B, S : principal \n Na, Ma, Nb, Mb : number \n Kas, Kbs, Kab : key \n Ta, Tb : time \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Tb}Kbs, Nb \n 3. S -> A : {B, Na, Kab, Tb}Kas, {A, Kab, Tb}Kbs, Nb \n 4. A -> B : {A, Kab, Tb}Kbs, {Nb}Kab \n 5. A -> B : Ma, {A, Kab, Tb}Kbs \n 6. B -> A : Mb, {Ma}Kab \n 7. A -> B : {Mb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nOtway Rees\n\nA, B, S : principal \n M, Na, Nb : nonce \n Kas, Kbs, Kab : key \n\n1. A -> B : M, A, B, {Na, M, A, B}Kas \n 2. B -> S : M, A, B, {Na, M, A, B}Kas , {Nb, M, A, B}Kbs \n 3. S -> B : M, {Na, Kab}Kas, {Nb, Kab}Kbs \n 4. B -> A : M, {Na, Kab}Kas" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nPEAP with MS-CHAP\n\nP, S : principal\nKs, Kca : public_key\nPw : symmetric_key\nNp, Ns, PMS : nonce\nSessionID, CipherSuite : text\nCcs : text\nH1, H2, PRF, KeyGen : hash_func\nalias M = PRF(PMS, Np, Ns)\nalias ClientK = KeyGen(P, Np, Ns, M)\nalias ServerK = KeyGen(S, Np, Ns, M)\nalias Finished = H1(M, P, S, Np, CipherSuite, SessionID)\n\n1. S -> P : id_request\n2. P -> S : P\n3. S -> P : start_peap\n4. P -> S : Np, SessionID, CipherSuite\n5. S -> P : Ns, SessionID, CipherSuite, {S, Ks}inv(Kca)\n6. P -> S : {PMS}Ks, Ccs\n7. S -> P : Ccs, {Finished}ServerK\n8. P -> S : {P}ClientK\n9. S -> P : {Ns}ServerK\n10. P -> S : {Np, H2(Pw, Np, Ns, P)}ClientK\n11. S -> P : {H2(Pw, Np)}ServerK\n12. P -> S : ack_message\n13. S -> P : eap_success" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nPaulson's strengthened version of Yahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, Nb, {A, Na}Kbs \n 3. S -> A : Nb, {B, Kab, Na}Kas, {A, B, Kab, Nb}Kbs \n 4. A -> B : {A, B, Kab, Nb}Kbs, {Nb}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nRADIUS Remote Authentication Dial In User Service\n\nC, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nSuccess, Failure, Access_accept, Access_reject : text\nMD5 : hash_func\n\n1. C -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n2. S -> C : NAS_ID, Access_accept\n3. C -> S : NAS_ID, Success" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nRADIUS Remote Authentication Dial In User Service (with challenge)\n\nC, S : principal\nKcs : symkey\nNAS_ID, NAS_PORT : text\nChall_Message : text\nSuccess, Failure, Access_accept, Access_reject : text\nMD5 : hash_func\n\n1. C -> S : NAS_ID, NAS_PORT, MD5(Kcs)\n2. S -> C : NAS_ID, Chall_Message\n3. C -> S : NAS_ID, {Chall_Message}Kcs\n4. S -> C : NAS_ID, Access_accept\n5. C -> S : NAS_ID, Success" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (IdP-initiated with back channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDaa, IDresolve, Resource, REF : text\n\n1. C -> IdP : C, URI, SP\n2. IdP -> C : SP, IdP, REF\n3. C -> SP : IdP, REF\n4. SP -> IdP : IDresolve, SP, IdP, REF\n5. IdP -> SP : IDresolve, IdP, URI, IDaa, SP, IdP, C, URI\n6. SP -> C : URI, Resource" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (IdP-initiated with front channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDaa, Resource : text\n\n1. C -> IdP : C, URI, SP\n2. IdP -> C : IdP, URI, IDaa, SP, IdP, C, URI\n3. C -> SP : IDaa, IdP, URI, SP, C\n4. SP -> C : URI, Resource" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSAML v.2 Web SSO Profile (SP-initiated with back channels)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nIDar, IDaa, IDresolve_1, IDresolve_2, Resource, REF_1, REF_2 : text\n\n1. C -> SP : C, URI\n2. SP -> C : IdP, SP, REF_1\n3. C -> IdP : C, SP, REF_1\n4. IdP -> SP : IDresolve_1, IdP, SP, REF_1\n5. SP -> IdP : IDresolve_1, SP, IdP, IDar, URI\n6. IdP -> C : SP, IdP, REF_2\n7. C -> SP : IdP, REF_2\n8. SP -> IdP : IDresolve_2, SP, IdP, REF_2\n9. IdP -> SP : IDresolve_2, IdP, URI, IDar, {SP, IdP, C, IDaa, URI}inv(KIdP)\n10. SP -> C : URI, Resource" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSAML-based SSO for Google Apps (SP-initiated with front channels, fixed variant)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nID, Resource : text\n\n1. C -> SP : URI\n2. SP -> C : C, IdP, (ID, SP), URI\n3. C -> IdP : C, IdP, (ID, SP), URI\n4. IdP -> C : SP, {SP, C, IdP, ID}inv(KIdP), URI\n5. C -> SP : SP, {SP, C, IdP, ID}inv(KIdP), URI\n6. SP -> C : Resource" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSAML-based SSO for Google Apps (SP-initiated, Google unsafe variant)\n\nC, IdP, SP : principal\nKIdP : public_key\nURI : protocol_id\nID, Resource : text\n\n1. C -> SP : URI\n2. SP -> C : C, IdP, (ID, SP), URI\n3. C -> IdP : C, IdP, (ID, SP), URI\n4. IdP -> C : SP, {C, IdP}inv(KIdP), URI\n5. C -> SP : SP, {C, IdP}inv(KIdP), URI\n6. SP -> C : Resource" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSIP Diameter Session Initiation Protocol\n\nUAC, SS1, SS2, DS : principal\nNonce : nonce\nPWD : text\nDest : protocol_id\nH : hash_func\nsipregister, sip401, sip200 : protocol_id\n\n1. UAC -> SS1 : sipregister, UAC, Dest\n2. SS1 -> DS : UAC, Dest\n3. DS -> SS1 : UAC, SS2\n4. SS1 -> SS2 : sipregister, UAC, Dest\n5. SS2 -> DS : Dest, UAC\n6. DS -> SS2 : Nonce, UAC\n7. SS2 -> SS1 : sip401, Nonce\n8. SS1 -> UAC : sip401, Nonce\n9. UAC -> SS1 : sipregister, UAC, Dest, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n10. SS1 -> DS : UAC, Dest\n11. DS -> SS1 : UAC, SS2\n12. SS1 -> SS2 : sipregister, UAC, Dest, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n13. SS2 -> DS : Dest, UAC, Nonce, H(Nonce, H(UAC, PWD), H(Dest))\n14. DS -> SS2 : UAC, success\n15. SS2 -> SS1 : sip200\n16. SS1 -> UAC : sip200" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSK3\n\nA, B, S, Ca, Cb : principal \n Ka, Kb : symkey \n Kac, Kbc : symkey \n Na, Nb : nonce \n 0,1,2 : number \n alias Kab = {A, 0}Kb \n alias Pab = Kab + {B, 1}Ka \n\n1. A -> S : A, B \n 2. S -> A : Pab, {Pab, B, 2}Ka \n 3. A -> Ca : A \n 4. Ca -> A : Na, {Na, 1, 1}Kac \n 5. A -> B : A, Na \n 6. B -> Cb : A, Na \n 7. Cb -> B : Nb, {Nb, 0, 0}Kab, {Na, Nb, 1}Kab, {Nb, 0, 1}Kab \n 8. B -> A : Nb, {Na, Nb, 1}Kab \n 9. A -> Ca : B, Na, Nb, Pab, {Pab, B, 2}Ka, {Na, Nb, 1}Kab,\n{Nb, 0, 1}Kab \n10. Ca -> A : {Nb, 0, 0}Kab, {Nb, 0, 1}Kab \n11. A -> B : {Nb, 0, 1}Kab" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSPLICE/AS\n\nS, C, AS : principal \n N1, N2, N3 : nonce \n T : timestamp \n L : lifetime \n pk, sk : principal -> key (keypair) \n\n1. C -> AS : C, S, N1 \n 2. AS -> C : AS, {AS, C, N1, pk(S)}sk(AS) \n 3. C -> S : C, S, {C, T, L, {N2}pk(S)}sk(C) \n 4. S -> AS : S, C, N3 \n 5. AS -> S : AS, {AS, S, N3, pk(C)}sk(AS) \n 6. S -> C : S, C, {S, inc(N2)}pk(C)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSRP: Secure Remote Passwords\n\nA, B: principal (Client, Server)\nPassword: shared secret between A and B\nSalt: random value known to server, used to prevent dictionary attacks\nG: generator for Diffie-Hellman exponentiation\nNa, Nb: nonces generated by A and B respectively\nV: password verifier = g^x mod N, with x = SHA(salt | SHA(A | ':' | Password))\nDHX, DHY: Diffie-Hellman public values\nK: session key derived from DH values and verifier\nM: proof of key, H(A,B,K,...)\n\n1. A -> B: A, G^Na\n2. B -> A: Salt, {G^Nb}_V\n3. A -> B: M\n4. B -> A: H(G^Na, M, K)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSchnorr's Protocol\n\nA, B : principal \n Na, Nb : fresh number \n Sa : private key \n Pa = exp(g,Sa) : public key \n A chooses Na and computes a = exp(g,Na) \n\n1. A -> B : a \n B chooses Nb \n 2. B -> A : Nb \n A computes r = Na + Nb Sa \n 3. A -> B : r \n B checks that exp(g, r) = a exp(Pa,Nb)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nShamir-Rivest-Adleman Three Pass Protocol\n\nA, B : principal \n Ka, Kb : symkey \n M : fresh number \n\n1. A -> B : {M}Ka \n 2. B -> A : {{M}Ka}Kb \n 3. A -> B : {M}Kb" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nSmartRight view-only\n\nCC, TC : principal \n VoKey, VoR, VoRi, CW : number \n Kc : key \n h : number -> number \n\n1. CC -> TC : {VoKey, CW+VoR}Kc \n 2. TC -> CC : VoRi \n 3. CC -> TC : VoR, {h(VoRi)}VoKey" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nTESLA: Timed Efficient Stream Loss-tolerant Authentication\n\nS, R: principal\nK_N: random symmetric key generated by S\nK_i: keys derived from K_N using a one-way function F\nM_i: messages broadcast by S\nN: total number of messages\nF: one-way hash function\ntext: generic message content\n\n1. S -> R: {N, K_0}inv(K_S) where K_0 = F^N(K_N)\n2. For i = 1 to N-1, S -> R: M_i, hash(K_i, M_i), K{i-1}" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nTMN\n\nA, B, S : principal \n Ka, Kb : key \n PK, SK : principal -> key (keypair) \n\n1. A -> S : B, {Ka}PK(S) \n 2. S -> B : A \n 3. B -> S : A, {Kb}PK(S) \n 4. S -> A : B, {Kb}Ka" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nTSIG Transaction Signature\n\nC, S : principal\nK : symkey\nN1, N2 : nonce\nM1, M2 : text\nTAG1, TAG2 : text\nH : hash_func\n\n1. C -> S : TAG1, M1, {H(TAG1, M1), N1}K\n2. S -> C : TAG2, M1, M2, {H(TAG2, M1, M2), N2}K" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nUMTS-AKA: Authentication and Key Agreement\n\nS, M: principal (Server, Mobile)\nk(M): shared secret key between S and M\nseq: sequence number maintained by both S and M\nr: random nonce generated by S\nF1, F2, F3, F4, F5: cryptographic hash or one-way functions\nCK, IK, KA: session keys derived from k(M) and r\nAUTN: authentication token\n\n1. M -> S: M\n2. S -> M: r; {seq}_Ka; F1(k(M); seq; r)\n3. M computes KA, seq, and verifies F1(k(M); seq; r); if valid, increments seq\n4. M -> S: F2(k(M); r)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nUsing Non-reversible Function Protocol\n\nA, B : principal\nKab, K : symkey\nRa, Rb : nonce\nf : randomNo -> msg\n\n1. B -> A : B, Rb\n2. A -> B : A, {f(Rb), Ra, A, K}Kab\n3. B -> A : B, {f(Ra)}K" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWide Mouthed Frog\n\nA, S : principal \n Kas, Kbs, Kab : symkey \n Ta, Ts : timestamp \n\n1. A -> S : A, {Ta, B, Kab}Kas \n 2. S -> B : {Ts, A, Kab}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWired Equivalent Privacy Protocol\n\nA, B : principal \n Kab : symkey \n RC4 : message, symkey -> message \n C : message -> message \n\n1. A -> B : v, ((M,C(M)) xor RC4(v,Kab))" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Mutual Authentication\n\nP, Q, S : principal \n Kps, Kqs, Kpq : key \n N1, N2 : number \n\n1. P -> Q : P, N1 \n 2. Q -> P : Q, N2 \n 3. P -> Q : {P, Q, N1, N2}Kps \n 4. Q -> S : {P, Q, N1, N2}Kps, {P, Q, N1, N2}Kqs \n 5. S -> Q : {Q, N1, N2, Kpq}Kps, {P, N1, N2,Kpq}Kqs \n 6. Q -> P : {Q, N1, N2, Kpq}Kps, {N1, N2}Kpq \n 7. P -> Q : {N2}Kpq" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Pi\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {Nb}Kas \n 4. B -> S : {A, {Nb}Kas}Kbs \n 5. S -> B : {Nb}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Pi 1\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,B,Nb}Kas \n 4. B -> S : {A, B, {A, B, Nb}Kas}Kbs \n 5. S -> B : {A, B, Nb}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Pi 2\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,Nb}Kas \n 4. B -> S : {A, {A, Nb}Kas}Kbs \n 5. S -> B : {A, Nb}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Pi 3\n\nA, B, S : principal \n Nb : nonce \n Kas, Kbs : skey \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {Nb}Kas \n 4. B -> S : {A, {Nb}Kas}Kbs \n 5. S -> B : {A, Nb}Kbs" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nWoo and Lam Pi f\n\nA, B, S : principal \n shared : (principal, principal):key \n Nb : nonce \n\n1. A -> B : A \n 2. B -> A : Nb \n 3. A -> B : {A,B,Nb}shared(A, S) \n 4. B -> S : {A, B, Nb, {A, B, Nb}shared(A, S)}shared(B, S) \n 5. S -> B : {A, B, Nb}shared(B, S)" }, { "role": "assistant", "content": "" } ]
[ { "role": "system", "content": "You are an expert in formal verification of security protocols." }, { "role": "user", "content": "Analyze the following protocol:\n\nYahalom\n\nA, B, S : principal \n Na, Nb : number fresh \n Kas, Kbs, Kab : key \n A knows : A, B, S, Kas \n B knows : B, S, Kbs \n S knows : S, A, B, Kas, Kbs \n\n1. A -> B : A, Na \n 2. B -> S : B, {A, Na, Nb}Kbs \n 3. S -> A : {B, Kab, Na, Nb}Kas, {A, Kab}Kbs \n 4. A -> B : {A, Kab}Kbs, {Nb}Kab" }, { "role": "assistant", "content": "" } ]

Security Protocols Open Repository (SPORE) Dataset

This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.

Dataset Description

The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes:

  • Principal declarations (participants in the protocol)
  • Cryptographic primitives (keys, nonces, timestamps, etc.)
  • Message exchange sequences with cryptographic operations
  • Clear notation for encryption, signing, and other security operations

UPDATE

  • Oct-23-2025: This dataset now includes additional protocols from the Clark-Jacob Library, the AVISPA Library and the AVANTSSAR Library not originally available in the SPORE dataset.

Dataset Structure

The dataset is available in two flavours: instruction and conversation.

Each entry in the instruction dataset has the schema:

{"text": "<Protocol Name>\n\n<Protocol Specifications>"}

Each entry in the conversation dataset has the schema:

{
  "messages": [
    {"role": "system", "content": "You are an expert in formal verification of security protocols."},
    {"role": "user", "content": "Analyze the following protocol:\n\n<Protocol Name>\n\n<Protocol Specifications>"},
    {"role": "assistant", "content": ""}
  ]
}

The protocol specifications use a standard notation:

  • A, B, S: Principals (participants)
  • Na, Nb: Nonces (random values)
  • Ka, Kb: Cryptographic keys
  • {M}K: Message M encrypted with key K
  • A -> B: Message flow from A to B

Use Cases

This dataset is designed for:

  1. Protocol Understanding: Training LLMs to parse and comprehend security protocol specifications
  2. Protocol Analysis: Learning to identify participants, message flows, and cryptographic operations
  3. Security Research: Understanding historical protocols and their vulnerabilities
  4. Formal Methods: Learning formal notation for security protocols

Dataset Creation

Source Data

All protocols are sourced from:

Data Processing

The original protocol specifications have been:

  • Cleaned of formatting artifacts
  • Stripped of comments and metadata
  • Standardized to a consistent text format
  • Sorted in alphabetical order of the protocol names
  • Converted to JSONL for easy loading

Training Example

from datasets import load_dataset

dataset = load_dataset("dassarthak18/spore-protocols", "instruction")

training_args = TrainingArguments(
    # your args
)

trainer = SFTTrainer(
    model=model,
    args=training_args,
    train_dataset=dataset['train'],
    dataset_text_field="text",
)

Dataset Statistics

  • Total Protocols: 49 protocols from SPORE + 18 protocols from Clark-Jacob library + 16 protocols from AVISPA library + 6 protocols from AVANTSSAR library
  • Protocol Families: Includes variations, fixes, and modified versions of classic protocols
  • Average Length: Varies from simple 3-message protocols to complex multi-party protocols
  • Language: Formal protocol specification language

Limitations

  • The dataset is relatively small (89 protocols)
  • Protocols are represented in a specific formal notation
  • Does not include natural language descriptions or security proofs

Citation

@misc{spore,
  title = {Security Protocols Open Repository},
  author = {{LSV - ENS Paris-Saclay}},
  howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}},
  note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France}
}

@techreport{wrro72494,
            note = {Query date: 14/01/2011},
            year = {1997},
           title = {A survey of authentication protocol literature: Version 1.0},
            type = {Report},
     institution = {ARRAY(0x557103a11320)},
       publisher = {Citeseer},
        keywords = {Authentication. ,Security Protocols},
             url = {https://eprints.whiterose.ac.uk/id/eprint/72494/},
          author = {Clark, John Andrew and Jacob, Jeremy Lawrence}
}

@inproceedings{Armando2005AVISPA,
  author    = {Armando, Alessandro and Basin, David and Boichut, Yohan and
               Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and
               Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and
               Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and
               Rusinowitch, Michael and Santiago, J. and Turuani, M. and
               Vigan\`o, Luca and Vigneron, L.},
  title     = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications},
  booktitle = {Proceedings of Computer Aided Verification (CAV)},
  series    = {Lecture Notes in Computer Science},
  volume    = {3576},
  pages     = {281--285},
  year      = {2005},
  publisher = {Springer},
  doi       = {10.1007/11513988\_27}
}

@inproceedings{AVANTSSAR2012,
  author    = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and
               Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro},
  title     = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?},
  booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)},
  series    = {IFIP Advances in Information and Communication Technology},
  volume    = {376},
  pages     = {68--79},
  year      = {2012},
  publisher = {Springer},
  doi       = {10.1007/978-3-642-30436-1\_6}
}
Downloads last month
97

Collection including dassarthak18/spore-protocols