Chapter 8. Simplifying transformations

In previous chapters we have seen how we can analyze small security protocols. However, most commercial protocols are considerably more complicated than those we have seen so far. For example, the CyberCash Main Sequence protocol is as in Figure 8.1; those fields whose names finish with an underscore are abbreviations, defined in Figures 8.2 and 8.3. This is a protocol for carrying out commercial transactions over the internet between a customer and a merchant. It is designed to provide many functions within a single protocol, including secrecy of sensitive information (such as customer card numbers) and authentication for the involved parties. This protocol contains dozens of fields, and in one place, ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.