cpsa: Symbolic cryptographic protocol analyzer
The Cryptographic Protocol Shapes Analyzer (CPSA) attempts to enumerate all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Many naturally occurring protocols have only finitely many, indeed very few shapes. Authentication and secrecy properties are easy to determine from them, as are attacks and anomalies, and an auxiliary tool reads off strongest authentication and secrecy goals from the shapes.
For each input problem, the CPSA program is given some initial behavior, and it discovers what shapes are compatible with it. Normally, the initial behavior is from the point of view of one participant. The analysis reveals what the other participants must have done, given the participant's view. The search is complete, i.e. we proved every shape can in fact be found in a finite number of steps, relative to a procedural semantics of protocol roles.
The package contains a set of programs used to perform the analysis and display it in a browser. Program documentation is in the doc directory in the source distribution, and installed in the package's data directory. You can locate the package's data directory by typing "cpsa --help" to a command prompt. New users should study the documentation and the sample inputs in the data directory. The source distribution includes a test suite with an expanded set of input files and is easily installed on operating systems that decend from Unix. Serious Windows users should install MSYS so as to allow the use of make and script execution.
The theory and algorithm used by CPSA was developed with the help of Joshua D. Guttman, John D. Ramsdell, Jon C. Herzog, Shaddin F. Doghmi, F. Javier Thayer, Paul D. Rowe, and Moses D. Liskov. John D. Ramsdell implemented the algorithm in Haskell. CPSA was designed and implemented at The MITRE Corporation.
[Skip to Readme]
Downloads
- cpsa-4.4.4.tar.gz [browse] (Cabal source package)
- Package description (as included in the package)
Maintainer's Corner
For package maintainers and hackage trustees
Candidates
Versions [RSS] | 2.0.0, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.10, 2.2.11, 2.2.12, 2.2.13, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.4.0, 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 3.3.0, 3.3.1, 3.3.2, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, 3.6.1, 3.6.2, 3.6.3, 3.6.4, 3.6.5, 3.6.6, 3.6.7, 3.6.8, 3.6.9, 3.6.10, 3.6.11, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.4.5 |
---|---|
Change log | ChangeLog |
Dependencies | base (>=4.13 && <5), containers, directory, parallel [details] |
License | BSD-3-Clause |
Author | |
Maintainer | guttman@mitre.org |
Category | Cryptography |
Source repo | head: git clone git://github.com/mitre/cpsaexp.git |
Uploaded | by joshuaguttman at 2024-06-21T19:56:36Z |
Distributions | NixOS:4.4.5 |
Reverse Dependencies | 1 direct, 0 indirect [details] |
Executables | cpsa4dbprolog, cpsa4db, cpsa4prolog, cpsa4query, cpsa4debranch, cpsa4rolecoq, cpsa4coq, cpsa4roletran, cpsa42latex, cpsa4init, cpsa4json, cpsa4pp, cpsa4shapes, cpsa4graph, cpsa4diff, cpsa4goalsat, cpsa4prot, cpsa4sas, cpsa4 |
Downloads | 40577 total (74 in the last 30 days) |
Rating | 2.25 (votes: 2) [estimated by Bayesian average] |
Your Rating | |
Status | Docs not available [build log] Last success reported on 2024-06-21 [all 1 reports] |