3.6. Summary

This chapter has considered how authentication and secrecy properties can be captured by enhancing CSP descriptions of protocols with the introduction of ‘specification events’ into the descriptions of honest agents. These events do not affect the interactions between the components of the protocol, and so they do not change the attacks that are possible on a protocol. They allow the intentions of the protocol designer or specifier to be expressed explicitly in terms of what should have been achieved when a protocol participant reaches a particular state. Requirements on protocols are captured by the introduction of appropriate specification events at particular points of the CSP protocol description, and then by describing the ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.