Information Technology Reference
In-Depth Information
way, we have designed various test-cases to confirm the effectiveness of imple-
mented features and highlight the methods which have been used to achieve those
features.
Listing 5 SCYTHER Script
#### Secure SCIM Protocol ####
usertype SessionKey, String;
protocol Secure-SCIM(CSP1,CSP2)}
{
{ Role CSP1 }
{
fresh identity-Credentials: String;
fresh request: String;
var response: String;
var responsecode: String;
var pre-sharedKey: SessionKey;
send\_1(CSP1,CSP2,CSP1,{request}k(CSP1,CSP2));
recv\_2(CSP2,CSP1,{request,response} k(CSP1,CSP2));
send\_3(CSP1,CSP2,{response}k(CSP1,CSP2));
recv\_4(CSP2,CSP1,{pre-sharedKey,responsecode,
request} k(CSP1,CSP2));
claim\_I1(CSP1,Alive);
claim\_I2(CSP1,Nisynch);
claim\_I3(CSP1,Weakagree);
claim\_I4(CSP1,Secret, pre-sharedKey);
}
{ Role CSP2 }
{
var identity-Credentials: String;
var request: String;
fresh response: String;
fresh responsecode: String;
fresh pre-sharedKey: SessionKey;
recv\_1(CSP1,CSP2,CSP1,{request}k(CSP1,CSP2));
send\_2(CSP2,CSP1,{request,response}k(CSP1,CSP2));
recv\_3(CSP1,CSP2,{response}k(CSP1,CSP2));
send\_4(CSP2,CSP1,{pre-sharedKey,responsecode,
request} k(CSP1,CSP2));
claim\_R1(CSP2,Alive);
claim\_R2(CSP2,Nisynch);
claim\_R3(CSP2,Weakagree);
claim\_R4(CSP2,Secret, pre-sharedKey);
}
}
Search WWH ::




Custom Search