Scyther is a tool
for the automatic verification of security protocols.
For a performance comparison between Scyther and a number of tools developed by others, please read the comparison paper.
The latest stable version of Scyther is v1.1.2, which was released on December 12, 2013.
|Version||Windows||Mac OS X||Linux||Comments||v1.1.2||Download||Download||Download||This is the standard version.||Compromise-0.9.1||Download||Download||Download||Choose this if you need support for various adversary models.|
After downloading Scyther, check the installation instructions.
Scyther is an automated security protocol verification tool. Some interesting features are:
Some selected protocols that have been analysed with Scyther:
The above list is far from complete. Many more source files are included in the distribution, or can be directly downloaded here.
We also describe a selection of protocol models for our tools on the protocol models page.
There are also a number of papers which use Scyther (by various authors), but they are not listed here (yet).
If you would like to contribute protocol models, please contact Cas Cremers.
If you would like to contribute to the development of the Scyther tool, read the below:
Since November 2012, development of Scyther has moved to Github:
Please visit the repository page to download the sources, help with development, or report issues.
Besides the book, you may want to have a look at the Scyther exercise set which is useful for giving a course on security protocols.
People using Scyther are recommended to subscribe to the Scyther-users mailing list. If new versions of the tool are released, an announcement will be made on the mailing list.