2.2. Data types for protocol models

Real implementations of cryptographic protocols use data that is composed of blocks of bits, and encryption algorithms are computed over the same type of structures and might have properties that are open to exploitation by an intruder. The nature of this data, and the form of the encryption used, are both extremely important when it comes to analyzing a system for security. After all, an intruder is quite free to play around with data at its lowest level, and to try to break or otherwise disturb the encryption.

For example, if a knows that a certain message contains an amount of money that is to be paid to her, encrypted by adding some private numeric key to it, she might feel that it is to her advantage ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.