O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

9.8. Strand spaces

The strand spaces approach has been developed fairly recently by Guttman et al. from MITRE. Roughly speaking, a strand represents the sequence of actions in which a particular protocol principal may participate. For an honest principal this encodes the expected sequence of send and receive messages associated with a particular role of the protocol. Agents can play multiple roles simultaneously. Thus for the (corrected) Needham-Schroeder-Lowe Public-Key protocol the initiator strand is:

The + and − signs signify whether the term is transmitted or received respectively by the agent in question. Thus the initiator, a in this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required