The tamarin-prover package

[Tags:deprecated, gpl, program]

The tamarin prover is a tool for the analysis of security protocols. It implements a constraint solving algorithm that supports both falsification and verification of security protocols with respect to an unbounded number of sessions. The underlying security protocol model uses multiset rewriting to specify protocols and adversary capabilities, a guarded fragment of first-order logic to specify security properties, and equational theories to model the algebraic properties of cryptographic operators.

The paper describing the theory underlying the tamarin prover is currently under submission to CSF 2012. Drop us ( or a mail, if you would like to obtain a copy of the paper.

The tamarin prover supports both a batch analysis mode and the interactive construction of security proofs using a GUI. Example protocols and the user guide are installed together with the prover. Just call the tamarin-prover executable without any arguments to get more information.

The tamarin prover uses maude ( as a unification backend and GraphViz ( to visualize constraint systems. Detailed instructions for installing the tamarin prover are given here:

[Skip to Readme]


Change log CHANGES
Dependencies aeson (==0.3.*), array (==0.3.*), base (==4.*), binary (==0.5.*), blaze-builder (==0.3.*), bytestring (==0.9.*), cmdargs (>=0.6.8 && <0.7), containers (>=0.3 && <0.4.2), data-default (==0.2.*), deepseq (==1.1.*), derive (==2.5.*), directory (>=1.0 && <1.2), fclabels (==1.0.*), filepath (>=1.1 && <1.3), hamlet (==0.8.*), http-types (==0.6.*), monad-control (==0.2.*), mtl (==2.0.*), old-locale (==1.0.*), parallel (==3.2.*), parsec (==3.1.*), process (==1.0.*), safe (>=0.2 && <0.4), syb (>=0.3.3 && <0.4), tamarin-prover-term (==0.1.*), tamarin-prover-utils (==0.1.*), template-haskell (==2.5.*), text (==0.11.*), threads (==0.4.*), time (==1.2.*), transformers (==0.2.*), uniplate (==1.6.*), wai (==0.4.*), wai-extra (==0.4.3), warp (==0.4.*), yesod-core (==0.8.*), yesod-form (==0.1.*), yesod-json (==0.1.*), yesod-static (==0.1.*) [details]
License GPL
Copyright Benedikt Schmidt, Simon Meier, ETH Zurich, 2010-2012
Author Benedikt Schmidt <>, Simon Meier <>
Maintainer Simon Meier <>
Category Theorem Provers
Home page
Uploaded Fri Feb 10 21:30:09 UTC 2012 by SimonMeier
Distributions Arch:1.2.2, NixOS:
Downloads 3215 total (15 in the last 30 days)
0 []
Status Docs not available [build log]
All reported builds failed as of 2016-12-25 [all 6 reports]
Hackage Matrix CI



Build with support for multithreaded execution


Build with test coverage support


Build unit test driver


Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info


Maintainer's Corner

For package maintainers and hackage trustees

Readme for tamarin-prover

Readme for tamarin-prover-

README for the tamarin-prover for security protocol verification

Author: Simon Meier <>

Creation Date: 8/02/2012

1. Introduction

  The tool is written in Haskell and provides two usage modes as described

  to reproduce our results from the paper install the tool and run

    make case-studies

  in the root directory of this source distribution. This will create
  a directory './case-studies' with the analyzed files and their proofs and

2. Installation instructions

2.1 Requirements

  The tool was tested on Linux and Mac OsX. It relies on 
    - maude version 2.6 for AC unification 
      download and install "Full Maude 2.6" from

    - the 'dot' tool from GraphViz for rendering proof states as graphs

      download and install from
      (most Linux distributions have a corresponding package)
    - GHC 7.0.4 and cabal-install

      included in the Haskell Platform 2011.2.0.1
      available from

2.1 Installing tamarin-prover

  You need a working Haskell environment that provides GHC 7 and the 'cabal
  install' tool. The simplest way to get such an environment is to download and
  install the Haskell Platform package for your OS.
  Then call

    cabal install

  in the root directory of this source code package. This will use the
  Haskell's deployment tool 'cabal-install' to download all missing libraries
  from Hackage, the central Haskell library repository and install the
  'tamarin-prover' executable in the default installation location of
  cabal-install. The installation location is printed at the end of the build
  process. Note that this may take a long time due to the large number of
  dependencies of the built-in webserver used to serve the interactive mode.

3. Usage

the tamarin-prover can be used in two modes: 

  (1) a batch mode where it just tries to parse the given file (and if called
      with --prove) to prove their specified lemmas.

  (2) an interactive mode, which runs a webserver that allows to construct
      and explore security proofs interactively.
      This mode has to be run with an argument that specifies directory
      containing the protocol models to be investigated. 

See the help message output when calling 'tamarin-prover' without any flags
for more information.

4. Built-in Equational theories

There are several built-in equational theories which can be activated
for a given theory file by including:

> builtin: theoryname

The following theories are supported as builtins:

  functions: _ ^ _, inv(_), _*_
  equations: see paper

  functions: h(_)
  no equations

  functions: sign(_,_), verify(_,_,_), pk(_), true
  equations: verify(sign(m,sk), m, pk(sk)) = true

  functions: senc(_,_), sdec(_,_)
  equations: sdec(senc(m,k),k) = m

  functions: aenc(_,_), adec(_,_), pk(_)
  equations: adec(aenc(m, pk(sk)), sk) = m

* Happy Proving :-)
* In case of questions do not hesistate to contact the authors
*  or