5.2. The %-notation
It will often be the case that the sender and receiver of a message treat that message somewhat differently. For example, in many protocols an agent receives an encrypted message that it does not decrypt; instead the agent simply forwards the message to a third party. This is the case in the standard Yahalom protocol:
a does not decrypt the second component of message 3, but simply forwards it to b in message 4.
As a default, Casper treats agents receiving messages as if they are able to decrypt them (this helps to trap many user errors); hence when this is not possible we need some way of indicating to Casper that messages ...
Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.