8.5. Case study: The CyberCash Main Sequence protocol

We illustrate our simplifying transformations by sketching how they can be used to simplify the CyberCash Main Sequence protocol.

The protocol is designed to allow credit-card purchases to take place securely between a customer and merchant, with the aid of CyberCash who acts as a trusted third party. The customer and merchant each generate a session key, which they encrypt with CyberCash’s public key; they then use this session key to encrypt data sent to CyberCash, for secrecy. They each sign some data with a secret key, for authentication. CyberCash verifies the transaction, and sends acknowledgements to each, encrypted with the appropriate session key.

The goals of the protocol are not ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.