O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5.2. The %-notation

It will often be the case that the sender and receiver of a message treat that message somewhat differently. For example, in many protocols an agent receives an encrypted message that it does not decrypt; instead the agent simply forwards the message to a third party. This is the case in the standard Yahalom protocol:

a does not decrypt the second component of message 3, but simply forwards it to b in message 4.

As a default, Casper treats agents receiving messages as if they are able to decrypt them (this helps to trap many user errors); hence when this is not possible we need some way of indicating to Casper that messages ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required