dassarthak18 commited on
Commit
feefba4
·
verified ·
1 Parent(s): 4f5a7f5

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +12 -31
README.md CHANGED
@@ -22,11 +22,7 @@ size_categories:
22
 
23
  # Security Protocols Open Repository (SPORE) Dataset
24
 
25
- This dataset contains security protocol specifications from [Security Protocols Open Repository](http://www.lsv.ens-cachan.fr/spore) (SPORE), formatted for training large language models to understand and reason about cryptographic protocols.
26
-
27
- ## UPDATE
28
-
29
- - **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library as listed [here](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml).
30
 
31
  ## Dataset Description
32
 
@@ -37,6 +33,10 @@ The Security Protocols Open Repository is a comprehensive collection of security
37
  - Message exchange sequences with cryptographic operations
38
  - Clear notation for encryption, signing, and other security operations
39
 
 
 
 
 
40
  ### Dataset Structure
41
 
42
  Each entry in the dataset contains:
@@ -54,17 +54,6 @@ The protocol specifications use a standard notation:
54
  - `{M}K`: Message M encrypted with key K
55
  - `A -> B`: Message flow from A to B
56
 
57
- ### Example Protocols
58
-
59
- The dataset includes well-known protocols such as:
60
- - **Kerberos V5**: Network authentication protocol
61
- - **Needham-Schroeder**: Public key and symmetric key protocols
62
- - **Diffie-Hellman**: Key exchange protocol
63
- - **Otway-Rees**: Authentication protocol
64
- - **Wide Mouthed Frog**: Timestamp-based authentication
65
-
66
- and many more variations and fixes of classic protocols.
67
-
68
  ## Use Cases
69
 
70
  This dataset is designed for:
@@ -119,12 +108,9 @@ trainer = SFTTrainer(
119
  - The dataset is relatively small (67 protocols)
120
  - Protocols are represented in a specific formal notation
121
  - Does not include natural language descriptions or security proofs
122
- - Limited to protocols documented in SPORE as of the collection date
123
 
124
  ## Citation
125
 
126
- If you use this dataset, please cite the original SPORE repository:
127
-
128
  ```bibtex
129
  @misc{spore,
130
  title = {Security Protocols Open Repository},
@@ -132,16 +118,11 @@ If you use this dataset, please cite the original SPORE repository:
132
  howpublished = {\url{http://www.lsv.ens-cachan.fr/spore}},
133
  note = {Laboratoire Spécification et Vérification, ENS Cachan, France}
134
  }
135
- ```
136
-
137
- ## License
138
-
139
- This dataset is released under the MIT License. The original protocols are from the SPORE repository, which is publicly available for research and educational purposes.
140
 
141
- ## Acknowledgments
142
-
143
- We thank the maintainers of the Security Protocols Open Repository (SPORE) at LSV, ENS Cachan for making these protocol specifications publicly available.
144
-
145
- ## Contact
146
-
147
- For questions or issues regarding this dataset, please open an issue on the dataset repository.
 
22
 
23
  # Security Protocols Open Repository (SPORE) Dataset
24
 
25
+ This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.
 
 
 
 
26
 
27
  ## Dataset Description
28
 
 
33
  - Message exchange sequences with cryptographic operations
34
  - Clear notation for encryption, signing, and other security operations
35
 
36
+ ## UPDATE
37
+
38
+ - **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library as listed [here](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml).
39
+
40
  ### Dataset Structure
41
 
42
  Each entry in the dataset contains:
 
54
  - `{M}K`: Message M encrypted with key K
55
  - `A -> B`: Message flow from A to B
56
 
 
 
 
 
 
 
 
 
 
 
 
57
  ## Use Cases
58
 
59
  This dataset is designed for:
 
108
  - The dataset is relatively small (67 protocols)
109
  - Protocols are represented in a specific formal notation
110
  - Does not include natural language descriptions or security proofs
 
111
 
112
  ## Citation
113
 
 
 
114
  ```bibtex
115
  @misc{spore,
116
  title = {Security Protocols Open Repository},
 
118
  howpublished = {\url{http://www.lsv.ens-cachan.fr/spore}},
119
  note = {Laboratoire Spécification et Vérification, ENS Cachan, France}
120
  }
 
 
 
 
 
121
 
122
+ @misc{clark-jacob-msr2,
123
+ title = {Empirical Evaluation of the Protocol Specification Language MSR 2.0},
124
+ author = {Rishav Bhowmick and Iliano Cervesato},
125
+ howpublished = {\url{https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml}},
126
+ note = {School of Computer Science, Carnegie Mellon University Qatar}
127
+ }
128
+ ```