diff --git a/include/lemmas.spthy b/include/lemmas.spthy index 1ab016157b511509ad9960cf1ca99917b6ab7997..b7d47edd04c89328adbf64f3252677c5e912c7d9 100644 --- a/include/lemmas.spthy +++ b/include/lemmas.spthy @@ -109,13 +109,34 @@ lemma chip_hiding: | (Ex #m . (K(iid) @ #m & #i < #m)) " -lemma nonRepudiation: exists-trace +/* This lemma shows that the chip has NOT non-repudiation */ +// We use the exists-trace keyword because it is enough to show the possibility +// 1.: To exclude an empty trace, we check for a finished protocol run (with the two Completed facts) +// 2.: We define that the chip is not corrupted +// 3.: We say that for every data the chip computed (which we manually put into action facts) the adversary could know the value before + // We use the adversaries knowledge because it is easy to model and he can simple corrupt the terminal and execute the protocol instead +// Problems: Some information required so that the other party can compute the data is sent after the Computed fact + +lemma notNonRepudiation: exists-trace "Ex C T k sid #i #j . + Completed(k, sid, C, 'chip', T) @ #i // 1. + & Completed(k, sid, T, 'terminal', C) @ #j // 1. + & not(Ex #n . Corrupted(C) @ #n) // 2. + & (All data #m . Computed(C, 'chip', data) @ #m // 3. + ==> (Ex #k . K(data) @ #k & #k < #m)) // 3. + " + +/* This lemma shows that the chip has NOT non-repudiation */ +// We use the fact that every value the chip can calculate its partner could too +// We state the possibility that with a finished protocol run the terminal could identify as a chip because it knows all the computations too +// Problems: pkTe is a fresh value used in the DH key, T could simply get a chip certificate and key pair (this could be solved but would limit our model), limited by our model at the moment because the identity from Completed is from the sent certificate which prevents T from trying a replay scenario + +lemma notNonRepudiation2: exists-trace + "Ex C T T2 k k2 sid sid2 #i #i2 #j #j2 . Completed(k, sid, C, 'chip', T) @ #i & Completed(k, sid, T, 'terminal', C) @ #j - & not(Ex #n . Corrupted(C) @ #n) - & (All data #m . Computed(C, 'chip', data) @ #m - ==> (Ex #k . K(data) @ #k & #k < #m)) + & Completed(k2, sid2, T, 'chip', T2) @ #i2 + & Completed(k2, sid2, T2, 'terminal', T) @ #j2 " // Perfect forward secrecy