|Nadim Kobeissi b3dd726271 Verifpal 0.6.8||2 months ago|
|LICENSES||2 months ago|
|api/grammar||2 months ago|
|assets/windows||2 months ago|
|build||2 months ago|
|examples||2 months ago|
|internal/app/verifpal||2 months ago|
|tools||2 months ago|
|.gitignore||2 months ago|
|Build.cmd||3 months ago|
|CHANGELOG.md||2 months ago|
|CONTRIBUTING.md||3 months ago|
|FOSS.md||3 months ago|
|Makefile||3 months ago|
|README.md||2 months ago|
Verifpal is new software for verifying the security of cryptographic protocols. Building upon contemporary research in symbolic formal verification, Verifpal’s main aim is to appeal more to real-world practitioners, students and engineers without sacrificing comprehensive formal verification features.
In order to achieve this, Verifpal introduces a new, intuitive language for modeling protocols that is much easier to write and understand than the languages employed by existing tools. At the same time, Verifpal is able to model protocols under an active attacker with unbounded sessions and fresh values, and supports queries for advanced security properties such as forward secrecy or key compromise impersonation.
Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3, Telegram and other protocols. It is a community-focused project, and available under a GPLv3 license.
The Verifpal language is meant to illustrate protocols close to how one may describe them in an informal conversation, while still being precise and expressive enough for formal modeling. Verifpal reasons about the protocol model with explicit principals: Alice and Bob exist and have independent states.
Verifpal does not allow users to define their own cryptographic primitives. Instead, it comes with built-in cryptographic functions — this is meant to remove the potential for users to define fundamental cryptographic operations incorrectly.
When a contradiction is found for a query, the result is related in a readable format that ties the attack to a real-world scenario. This is done by using terminology to indicate how the attack could have been possible, such as through a man-in-the-middle on ephemeral keys.
Verifpal comes with a Visual Studio Code extension that offers syntax highlighting and, soon, live query verification within Visual Studio Code, allowing developers to obtain insights on their model as they are writing it.
Verifpal is still highly experimental software. Using it in a classroom or learning environment is welcome, but it should not yet be relied upon for academic formal verification work. For that, check out ProVerif: https://proverif.inria.fr.
The Verifpal User Manual is an essential guide to getting started with cryptographic protocol analysis using Verifpal. It is strongly recommended that you read the Verifpal User Manual before starting work with Verifpal.
You have three choices:
bash -c "curl -sL https://verifpal.com/install|bash"– note that this only works on Linux and macOS, and is also potentialy unsafe since you’re running an arbitrary script inside your terminal.
Buildto build Verifpal for Windows, Linux and macOS. This will also install dependencies.
make allto build Verifpal for Windows, Linux and macOS.
Builds will be available under
Verifpal offers an extension for Visual Studio Code that currently supports syntax highlighting for Verifpal models, and will soon support more advanced features. To install it, simply search for “Verifpal” from inside Visual Studio Code.
Sign up to the Verifpal Mailing List to stay informed on the latest news and announcements regarding Verifpal, and to participate in Verifpal discussions.
Verifpal is published by Symbolic Software. It is provided as free and open source software, licensed under the GNU General Public License, version 3. The Verifpal User Manual is provided under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license.
© Copyright 2019-2020 Nadim Kobeissi. All Rights Reserved. “Verifpal” and the “Verifpal” logo/mascot are registered trademarks of Nadim Kobeissi.