Equational Reasoning for Verified Cryptographic Security