Modeling Security Protocols in CSP
Security protocols work through the interaction of a number
of processes in parallel that send messages to each other.
CSP is therefore an obvious notation for describing the
participants and their role in the protocol
n Example: The Yahalom protocol
n Message 1    a g b :  a.na
n Message 2    b g s :  b.{a.na.nb}ServerKey(b)
n Message 3    s g a :  {b. kab.na.nb}ServerKey(a) .{a.kab}ServerKey(b)
n Message 4    a g b :  {a. kab}ServerKey(b) .{nb}kab
n Questions:
n Is the it based on symmetric or asymmetric cryptography?
n what are na and nb, and what is their purpose?