VerifHub
VerifHub allows Verifpal® users to easily share and discuss Verifpal models of cryptographic protocols. The VerifHub service provides unique URIs for each shared model which includes a syntax-highlighted model, an automatically generated diagram and a summary of the analysis results.
naxos.vp
Submitted on 20 Dec 23 13:11 UTC.attacker[passive]
principal I[
knows private ltki
ltpki = G^ltki
generates eski
exi = HASH(ltki, eski)
hki = G^exi
]
principal R[
knows private ltkr
ltpkr = G^ltkr
]
I -> R: hki, ltpki
principal R[
generates eskr
exr = HASH(ltkr, eskr)
hkr = G^exr
kr = HASH(ltpki^exr, hki^ltkr, hki^exr)
]
R -> I: hkr, ltpkr
principal I[
ki = HASH(hkr^ltki, ltpkr^exi, hkr^exi)
generates clearmsg
msg = ENC(ki, clearmsg)
maci = MAC(ki, msg)
]
I -> R: msg, maci
principal R[
macr = MAC(kr, msg)
_ = ASSERT(maci, macr)?
]
queries[
confidentiality? clearmsg
authentication? I -> R: msg
]
Analysis Results
The model submitter provided the following analysis results:
- Query 1 (Confidentiality): PASS
- Query 2 (Authentication): PASS
Please note that these results are not verified to be accurate. The model submitter may choose to provide false analysis results if they so desire. It is strongly recommended that you re-run the analysis of this model locally if you wish to verify the authenticity of the analysis results above.
Discuss This Model
© Copyright 2019- Nadim Kobeissi. All Rights Reserved. “Verifpal” and the “Verifpal” logo/mascot are registered trademarks of Nadim Kobeissi. Verifpal software is provided as free and open source software, licensed under the GPLv3. Verifpal User Manual, as well as this website, are provided under the CC BY-NC-ND 4.0 license. Published by Symbolic Software.