--- license: mit task_categories: - text-generation - question-answering - text-classification language: - en tags: - cryptography - security - cybersecurity - security-protocols - protocol-verification - formal-methods - spore - clark-jacob-library - avispa-library - avantssar-library pretty_name: Security Protocols Open Repository (SPORE) size_categories: - n<1K configs: - config_name: default data_files: - split: train path: "instruction.jsonl" --- # Security Protocols Open Repository (SPORE) Dataset This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols. ## Dataset Description The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes: - Principal declarations (participants in the protocol) - Cryptographic primitives (keys, nonces, timestamps, etc.) - Message exchange sequences with cryptographic operations - Clear notation for encryption, signing, and other security operations ## UPDATE - **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library, the AVISPA Library and the AVANTSSAR Library not originally available in the SPORE dataset. ### Dataset Structure The dataset is available in two flavours: *instruction* and *conversation*. Each entry in the instruction dataset has the schema: ```json {"text": "\n\n"} ``` Each entry in the conversation dataset has the schema: ```json { "messages": [ {"role": "system", "content": "You are an expert in formal verification of security protocols."}, {"role": "user", "content": "Analyze the following protocol:\n\n\n\n"}, {"role": "assistant", "content": ""} ] } ``` The protocol specifications use a standard notation: - `A, B, S`: Principals (participants) - `Na, Nb`: Nonces (random values) - `Ka, Kb`: Cryptographic keys - `{M}K`: Message M encrypted with key K - `A -> B`: Message flow from A to B ## Use Cases This dataset is designed for: 1. **Protocol Understanding**: Training LLMs to parse and comprehend security protocol specifications 2. **Protocol Analysis**: Learning to identify participants, message flows, and cryptographic operations 3. **Security Research**: Understanding historical protocols and their vulnerabilities 4. **Formal Methods**: Learning formal notation for security protocols ## Dataset Creation ### Source Data All protocols are sourced from: - The [Security Protocols Open REpository (SPORE)](http://www.lsv.ens-cachan.fr/spore), maintained by the Laboratoire Spécification et Vérification (LSV) at ENS Paris-Saclay. - The [Clark-Jacob Library with specifications in MSR 2.0](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml), maintained by Carnegie Mellon University Qatar. - The [Automated Validation of Internet Security Protocols and Applications (AVISPA) Library](https://web.archive.org/web/20160606114053fw_/http://www.avispa-project.org/library/avispa-library.html#IETF), funded under the EU Framework Programme 7 (FP7), now discontinued. - The [Automated VAlidatioN of Trust and Security of Service-oriented ARchitectures (AVANTSSAR) Library](https://web.archive.org/web/20170603130116/http://www.avantssar.eu/), funded under the EU Framework Programme 7 (FP7), now discontinued. ### Data Processing The original protocol specifications have been: - Cleaned of formatting artifacts - Stripped of comments and metadata - Standardized to a consistent text format - Sorted in alphabetical order of the protocol names - Converted to JSONL for easy loading ## Training Example ```python from datasets import load_dataset dataset = load_dataset("dassarthak18/spore-protocols", "instruction") training_args = TrainingArguments( # your args ) trainer = SFTTrainer( model=model, args=training_args, train_dataset=dataset['train'], dataset_text_field="text", ) ``` ## Dataset Statistics - **Total Protocols**: 49 protocols from SPORE + 18 protocols from Clark-Jacob library + 16 protocols from AVISPA library + 6 protocols from AVANTSSAR library - **Protocol Families**: Includes variations, fixes, and modified versions of classic protocols - **Average Length**: Varies from simple 3-message protocols to complex multi-party protocols - **Language**: Formal protocol specification language ## Limitations - The dataset is relatively small (89 protocols) - Protocols are represented in a specific formal notation - Does not include natural language descriptions or security proofs ## Citation ```bibtex @misc{spore, title = {Security Protocols Open Repository}, author = {{LSV - ENS Paris-Saclay}}, howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}}, note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France} } @techreport{wrro72494, note = {Query date: 14/01/2011}, year = {1997}, title = {A survey of authentication protocol literature: Version 1.0}, type = {Report}, institution = {ARRAY(0x557103a11320)}, publisher = {Citeseer}, keywords = {Authentication. ,Security Protocols}, url = {https://eprints.whiterose.ac.uk/id/eprint/72494/}, author = {Clark, John Andrew and Jacob, Jeremy Lawrence} } @inproceedings{Armando2005AVISPA, author = {Armando, Alessandro and Basin, David and Boichut, Yohan and Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and Rusinowitch, Michael and Santiago, J. and Turuani, M. and Vigan\`o, Luca and Vigneron, L.}, title = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications}, booktitle = {Proceedings of Computer Aided Verification (CAV)}, series = {Lecture Notes in Computer Science}, volume = {3576}, pages = {281--285}, year = {2005}, publisher = {Springer}, doi = {10.1007/11513988\_27} } @inproceedings{AVANTSSAR2012, author = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro}, title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?}, booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)}, series = {IFIP Advances in Information and Communication Technology}, volume = {376}, pages = {68--79}, year = {2012}, publisher = {Springer}, doi = {10.1007/978-3-642-30436-1\_6} } ```