Update README.md
Browse files
README.md
CHANGED
|
@@ -22,11 +22,7 @@ size_categories:
|
|
| 22 |
|
| 23 |
# Security Protocols Open Repository (SPORE) Dataset
|
| 24 |
|
| 25 |
-
This dataset contains security protocol specifications
|
| 26 |
-
|
| 27 |
-
## UPDATE
|
| 28 |
-
|
| 29 |
-
- **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library as listed [here](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml).
|
| 30 |
|
| 31 |
## Dataset Description
|
| 32 |
|
|
@@ -37,6 +33,10 @@ The Security Protocols Open Repository is a comprehensive collection of security
|
|
| 37 |
- Message exchange sequences with cryptographic operations
|
| 38 |
- Clear notation for encryption, signing, and other security operations
|
| 39 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 40 |
### Dataset Structure
|
| 41 |
|
| 42 |
Each entry in the dataset contains:
|
|
@@ -54,17 +54,6 @@ The protocol specifications use a standard notation:
|
|
| 54 |
- `{M}K`: Message M encrypted with key K
|
| 55 |
- `A -> B`: Message flow from A to B
|
| 56 |
|
| 57 |
-
### Example Protocols
|
| 58 |
-
|
| 59 |
-
The dataset includes well-known protocols such as:
|
| 60 |
-
- **Kerberos V5**: Network authentication protocol
|
| 61 |
-
- **Needham-Schroeder**: Public key and symmetric key protocols
|
| 62 |
-
- **Diffie-Hellman**: Key exchange protocol
|
| 63 |
-
- **Otway-Rees**: Authentication protocol
|
| 64 |
-
- **Wide Mouthed Frog**: Timestamp-based authentication
|
| 65 |
-
|
| 66 |
-
and many more variations and fixes of classic protocols.
|
| 67 |
-
|
| 68 |
## Use Cases
|
| 69 |
|
| 70 |
This dataset is designed for:
|
|
@@ -119,12 +108,9 @@ trainer = SFTTrainer(
|
|
| 119 |
- The dataset is relatively small (67 protocols)
|
| 120 |
- Protocols are represented in a specific formal notation
|
| 121 |
- Does not include natural language descriptions or security proofs
|
| 122 |
-
- Limited to protocols documented in SPORE as of the collection date
|
| 123 |
|
| 124 |
## Citation
|
| 125 |
|
| 126 |
-
If you use this dataset, please cite the original SPORE repository:
|
| 127 |
-
|
| 128 |
```bibtex
|
| 129 |
@misc{spore,
|
| 130 |
title = {Security Protocols Open Repository},
|
|
@@ -132,16 +118,11 @@ If you use this dataset, please cite the original SPORE repository:
|
|
| 132 |
howpublished = {\url{http://www.lsv.ens-cachan.fr/spore}},
|
| 133 |
note = {Laboratoire Spécification et Vérification, ENS Cachan, France}
|
| 134 |
}
|
| 135 |
-
```
|
| 136 |
-
|
| 137 |
-
## License
|
| 138 |
-
|
| 139 |
-
This dataset is released under the MIT License. The original protocols are from the SPORE repository, which is publicly available for research and educational purposes.
|
| 140 |
|
| 141 |
-
|
| 142 |
-
|
| 143 |
-
|
| 144 |
-
|
| 145 |
-
|
| 146 |
-
|
| 147 |
-
|
|
|
|
| 22 |
|
| 23 |
# Security Protocols Open Repository (SPORE) Dataset
|
| 24 |
|
| 25 |
+
This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.
|
|
|
|
|
|
|
|
|
|
|
|
|
| 26 |
|
| 27 |
## Dataset Description
|
| 28 |
|
|
|
|
| 33 |
- Message exchange sequences with cryptographic operations
|
| 34 |
- Clear notation for encryption, signing, and other security operations
|
| 35 |
|
| 36 |
+
## UPDATE
|
| 37 |
+
|
| 38 |
+
- **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library as listed [here](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml).
|
| 39 |
+
|
| 40 |
### Dataset Structure
|
| 41 |
|
| 42 |
Each entry in the dataset contains:
|
|
|
|
| 54 |
- `{M}K`: Message M encrypted with key K
|
| 55 |
- `A -> B`: Message flow from A to B
|
| 56 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 57 |
## Use Cases
|
| 58 |
|
| 59 |
This dataset is designed for:
|
|
|
|
| 108 |
- The dataset is relatively small (67 protocols)
|
| 109 |
- Protocols are represented in a specific formal notation
|
| 110 |
- Does not include natural language descriptions or security proofs
|
|
|
|
| 111 |
|
| 112 |
## Citation
|
| 113 |
|
|
|
|
|
|
|
| 114 |
```bibtex
|
| 115 |
@misc{spore,
|
| 116 |
title = {Security Protocols Open Repository},
|
|
|
|
| 118 |
howpublished = {\url{http://www.lsv.ens-cachan.fr/spore}},
|
| 119 |
note = {Laboratoire Spécification et Vérification, ENS Cachan, France}
|
| 120 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 121 |
|
| 122 |
+
@misc{clark-jacob-msr2,
|
| 123 |
+
title = {Empirical Evaluation of the Protocol Specification Language MSR 2.0},
|
| 124 |
+
author = {Rishav Bhowmick and Iliano Cervesato},
|
| 125 |
+
howpublished = {\url{https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml}},
|
| 126 |
+
note = {School of Computer Science, Carnegie Mellon University Qatar}
|
| 127 |
+
}
|
| 128 |
+
```
|