30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.2. CRYPTOGRAPHIC PROTOCOLS 51<br />

Example 11 We consider again the Needham-Schroeder symmetric key protocol. We<br />

consider three agents Alice, Bob, <strong>and</strong> s such that Alice instantiates once the sender<br />

role (or role A), Bob instantiates once the receiver role (or role B), <strong>and</strong> s instantiates<br />

once the server role (or role S). This instance <strong>of</strong> Needham-Schroeder symmetric key<br />

protocol is given by ({r1, r2, r3, r4, r5, r6},

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!