 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| n |
Security
properties: the goals that a protocol is
|
|
|
meant
to satisfy, relatively to specific kinds and
|
|
|
levels
of threat ñ the intruders and their capabilities
|
|
| n |
We
will consider the following security properties:
|
|
|
n |
Secrecy
|
|
|
n |
No
information leakage
|
|
|
n |
Authentication
|
|
|
n |
No
falsification of identity
|
|
|
n |
Non-repudiation
|
|
|
n |
Evidence
of the involvement of the other party
|
|
|
|
¸ |
Anonymity
|
|
|
n |
Protecting
the identity of agents wrt particular events
|
|