diff --git a/_spotlights/tamarin.md b/_spotlights/tamarin.md new file mode 100644 index 0000000000000000000000000000000000000000..9097761d95e17a97427e0d3c6ab071eff9a17068 --- /dev/null +++ b/_spotlights/tamarin.md @@ -0,0 +1,145 @@ +--- +layout: spotlight + +############################################################################### +# Template for Software spotlights +############################################################################### +# Templates starting with a _, e.g. "_template.md" will not be integrated into +# the spotlights. +# +# Optional settings can be left empty. + +# ----------------------------------------------------------------------------- +# Properties for spotlights list page +# ----------------------------------------------------------------------------- + +# The name of the software +name: Tamarin Prover + +# The date when the software was added to the spotlights YYYY-MM-DD +date_added: 2022-10-07 + +# Small preview image shown at the spotlights list page. +# Note: the path is relative to /assets/img/spotlights/ +preview_image: tamarin/tamarin.png + +# One or two sentences describing the software +excerpt: > + The Tamarin Prover is a state-of-the-art tool for the + analysis of security protocols, which underpin the security of + modern distributed computing; Tamarin has been used in analyses of + TLS 1.3, 5G, and the EMV (Chip-and-pin) standards, in each case + finding attacks and proving strong assurance properties for fixed + variants of the protocols. Tamarin's formal analysis supports both + falsification and unbounded verification in the symbolic model of + cryptography. + +# ----------------------------------------------------------------------------- +# Properties for individual spotlights page +# ----------------------------------------------------------------------------- +# Entries here will be shown in the green box on the right of the screen. + +# Jumbotron (optional) +# The path is relative to /assets/img/jumbotrons/ +title_image: + +# Title at the top, inside the title-content-container +title: Tamarin Prover – A Security Protocol Verification Tool + +# Add at least one keyword +keywords: + - Formal Verification + - Cryptographic Protocols + +# The Helmholtz research field +hgf_research_field: Information + +# At least one responsible centre +# Please use the full and official name of your centre +hgf_centers: + - CISPA Helmholtz Center for Information Security + +# List of other contributing organisations (optional) +contributing_organisations: + - name: "ETH Zurich" + link_as: https://inf.ethz.ch/ + - name: "Université de Lorraine" + link_as: https://www.loria.fr/en/ + - name: "University of Oxford" + link_as: https://www.cs.ox.ac.uk/ + +# List of scientific communities +scientific_community: + - Computer Aided Verification + - Computer Security + - Communication Security + - Privacy + - Logic and Computation + - Formal methods + +# Impact on community (optional, not implemented yet) +impact_on_community: + +# An e-mail address +contact: cremers@cispa.de + +# Platforms (optional) +# Provide platforms in this format +# - type: TYPE +# link_as: LINK +# Valid TYPES are: webpage, telegram, mailing-list, twitter, gitlab, github +# Mailing lists should be added as "mailto:mailinglist@url.de" +# More types can be implemented by modifying /_layouts/spotlight.html +platforms: + - type: webpage + link_as: https://tamarin-prover.github.io/ + - type: github + link_as: https://github.com/tamarin-prover/tamarin-prover + +# The software license, please use an SPDX Identifier (https://spdx.org/licenses/) if possible (optional) +license: GPL-3.0-only + +# Is the software pricey or free? (optional) +costs: free + +# What is this software used for in general (e.g. modelling)? (optional, not implemented yet) +software_type: + - + +# The applicaiton type (Desktop, Mobile, Web) (optional, not implemented yet) +application_type: + - Web + +# List of programming languages (optional) +programming_languages: + - Haskell + - Javascript + +# DOI (without URL, just 10.1000/1.0000000 ) (optional) +doi: 10.3233/JCS-210053 + +# Funding of the software (optional) +funding: + - shortname: # Abbreviation + funding_text: # Short text or sentence, if required by your funding guidelines (optional) + link_as: # Link (optional) +--- + +# Tamarin prover in a nutshell + +The Tamarin prover is a tool for the symbolic modelling and analysis of security protocols. It takes as input a security protocol model, specifying the actions taken by agents running the protocol in different roles (e.g., the protocol initiator, the responder, and the trusted key server), a specification of the adversary, and a specification of the protocol’s desired properties. Tamarin can then be used to automatically construct a proof that, even when arbitrarily many instances of the protocol’s roles are interleaved in parallel, together with the actions of the adversary, the protocol fulfils its specified properties; or produce a counterexample that represents an attack on the property. + +<div class="spotlights-text-image"> +<img src="{{ site.directory.images | relative_url}}spotlights/tamarin/attack.png" alt="Visual representation of an attack found on the current protocol model."> +<span>Visual representation of an attack found on the current protocol model.</span> +</div> + +In practice, the Tamarin tool has proven to be highly successful. It features support for trace and observational equivalence properties, automatic and interactive modes. Tamarin has built-in support for fine-grained models of cryptographic primitives through so-called equational theories, such as the one modelling Diffie-Hellman key exchanges. Tamarin has been applied to numerous protocols from different domains including: + +* Advanced key agreement protocols based on Diffie-Hellman exponentiation, such as verifying Naxos with respect to the eCK (extended Canetti Krawczyk) model; see (Schmidt et al. 2012). +* The Attack Resilient Public Key Infrastructure (ARPKI) (Basin et al. 2014). +* Transport Layer Security (TLS) (Cremers et al. 2016) +* and many others + + + diff --git a/assets/img/spotlights/tamarin/attack.png b/assets/img/spotlights/tamarin/attack.png new file mode 100644 index 0000000000000000000000000000000000000000..91a24d52a583e101cad848ef60010b8b2a901da1 Binary files /dev/null and b/assets/img/spotlights/tamarin/attack.png differ diff --git a/assets/img/spotlights/tamarin/tamarin.png b/assets/img/spotlights/tamarin/tamarin.png new file mode 100644 index 0000000000000000000000000000000000000000..b6987ad0fdbcdb95735b5a5137a6edfcdfc472ad Binary files /dev/null and b/assets/img/spotlights/tamarin/tamarin.png differ