Dm2_Ch1d_Examples on Using Propositional and Predicate Logic
Dm2_Ch1d_Examples on Using Propositional and Predicate Logic
Proposition and
Predicate Logic
Nguyen An Khuong,
Expressing
specifications by
Predicate Logic:
Protocol Requirements
Nguyen An Khuong,
Huynh Tuong Nguyen
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
2 Expressing specifications by Predicate Logic: Protocol Protocol Requirements
Requirements
1d.2
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Electing Puzzle Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
• Four men and four women are nominated for two positions.
• Exactly one man and one woman are elected.
Contents
• The men are A, B, C, D and the women are E, F, G, H. We Natural Deduction in
Propositional Logic:
know: Electing Puzzle
1d.3
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
d. Credential transfer both to and from a device MUST be specifications by
Predicate Logic:
supported. Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
d. Credential transfer both to and from a device MUST be specifications by
Predicate Logic:
supported. Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
d. Credential transfer both to and from a device MUST be specifications by
Predicate Logic:
supported. Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
d. Credential transfer both to and from a device MUST be specifications by
Predicate Logic:
supported. Protocol Requirements
1d.4
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Protocol Requirements Proposition and
Predicate Logic
• The following sentences are taken from the RFC3157 Nguyen An Khuong,
Internet Task-force Document ‘Securely Available Huynh Tuong Nguyen
Credentials – Requirements.’
• Specify it in predicate logic, defining predicate symbols as
appropriate:
a. An attacker can persuade a server that a successful login has
occurred, even if it hasn’t. Contents
b. An attacker can overwrite someone else’s credentials on the Natural Deduction in
server. Propositional Logic:
Electing Puzzle
c. All users enter passwords instead of names.
Expressing
d. Credential transfer both to and from a device MUST be specifications by
Predicate Logic:
supported. Protocol Requirements
Nguyen An Khuong,
Huynh Tuong Nguyen
Contents
Natural Deduction in
Propositional Logic:
Electing Puzzle
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.5
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Solutions Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
Expressing
specifications by
Predicate Logic:
Protocol Requirements
1d.5
Examples on Using
Huth and Ryan [2], Exercises 2.1.5: Solutions Proposition and
Predicate Logic
Nguyen An Khuong,
Huynh Tuong Nguyen
Expressing
b. An attacker can overwrite someone else’s credentials on the specifications by
Predicate Logic:
server: φ := ∃u∃c∃s∃d((¬ownsCredentials(u, c)) −→ Protocol Requirements
1d.5