A new version of APTE have been released : APTE v0.4beta. As previously mentioned, it can be both downloaded through the download webpage or directly through the GitHub release webpage.
This release is mainly focused on the API of APTE, by fixing some bugs and also providing a new set of statistics on the algorithm’s executions. Moreover, it allows a user to select different strategies to be used in the execution of the algorithm.
- Correction of a bug in the parser with the tuples.
- Addition of a module for statistic on the matrices generated by the algorithm
- New strategies for the algorithm available (see the different new options)
- An log option have been added that stores the tree of matrices. It should help following the generation of matrices by the algorithm.
- The help menu have been changed to match all the new options
- Addition of new examples.
A minor release of APTE soon after the major release of v0.3beta. You can download it here or on the download page.
- Fix of a stack overflow problem.
- The parser now handles properly the declared constants
- Addition of three new examples: Unlinkability of the Passive Authentication protocol of the electronic passport (without considering length, the existing attack when considering the length of messages and lastly the fix)
Since APTE is still in a beta version, there will probably be regular releases until the release of the first stable version. Do not hesitate to send examples of processes or bug reports at email@example.com or firstname.lastname@example.org.
The new release of APTE is out. We went from an alpha version to a beta version. It does not mean that there is no bug anymore but much less.
You can download it here APTE v0.3beta or on the download page.
This new version improves greatly the speed of the algorithm. Typically, executing one session of a protocol takes less than a second whereas it was around 1-3 minutes before. For two sessions of some protocols, it can still take around one/two hours. Some tests are currently performed for three sessions of some protocols
- Major modifications in the source code including the interfaces
- Optimization of the algorithm. Some examples that took 80 seconds in 0.2alpha to be executed are now executed in less than a second. (see the examples corresponding to the private authentication protocol in the archive)
- Several fixes of bugs
- First draft of documentation
- Improvements of the user interface