 |
 |
 |
 |
 |
 |
 |
 |
 |
| n |
The
Yahalom Protocol aims at providing
|
|
|
authentication of both parties :
|
|
|
authentication
of the initiator to the
|
|
|
responder,
and viceversa
|
|
|
| n |
We will
analyze the two authentication
|
|
|
properties
separately
|
|
|
| n |
This
requires two separateÝ enhancements
of
|
|
the
protocol
|
|