5.2. The %-notation

It will often be the case that the sender and receiver of a message treat that message somewhat differently. For example, in many protocols an agent receives an encrypted message that it does not decrypt; instead the agent simply forwards the message to a third party. This is the case in the standard Yahalom protocol:

a does not decrypt the second component of message 3, but simply forwards it to b in message 4.

As a default, Casper treats agents receiving messages as if they are able to decrypt them (this helps to trap many user errors); hence when this is not possible we need some way of indicating to Casper that messages ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.