 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
Security protocols work through the interaction of a number
|
 |
|
|
|
of
processes in parallel that send messages to each other.
|
|
|
CSP is
therefore an obvious notation for describing the
|
|
|
participants
and their role in the protocol
|
|
|
| n |
Example:
The Yahalom protocol
|
|
|
|
n |
Message 1
a g b : a.na
|
|
|
|
|
n |
Message 2
b g s : b.{a.na.nb}ServerKey(b)
|
|
|
|
|
n |
Message 3
s g a : {b. kab.na.nb}ServerKey(a)
.{a.kab}ServerKey(b)
|
|
|
|
|
n |
Message 4
a g b : {a. kab}ServerKey(b) .{nb}kab
|
|
|
|
|
| n |
Questions:
|
|
|
n |
Is the
it based on symmetric or asymmetric cryptography?
|
|
|
n |
what are na and nb, and what
is their purpose?
|
|
|
|