12.07.2015 Views

Security Protocols II: Syntax and Operational Semantics (Part 1)

Security Protocols II: Syntax and Operational Semantics (Part 1)

Security Protocols II: Syntax and Operational Semantics (Part 1)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Roles <strong>Semantics</strong><strong>Operational</strong> <strong>Semantics</strong>: ExampleExample (NSPK Attack)Trace th(0) th(1)(0, snd({na 0 , i} pk(i) ))(1, rcv({na 0 , a} pk(b) )) rcv({na 0 , NB} pk(a) )(1, snd({na 0 , nb 1 } pk(a) )) snd({NB} pk(i) ) rcv({nb 1 } pk(b) )(0, rcv({na 0 , nb 1 } pk(a) ))(0, snd({nb 1 } pk(i) ))(1, rcv({nb 1 } pk(b) ))Sebastian Mödersheim FMSEC Module 3, v.2 5.10.2009 36 of 36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!