8.1. Simplifying transformations for protocols

However, it will often appear plausible that much of the complexity of a large protocol, such as that given in Figure 8.1, could be removed without altering its security: some of the fields and some of the nested encryption might appear to be irrelevant to security; for example, in the CyberCash protocol, it appears as though the field representing the customer’s postal code is not relevant to the secrecy of the customer’s credit card number (we might require that the postal code be authenticated, but that is a different question). If we could prove that this complexity is indeed not needed for the security of the protocol, then it would be enough to analyze the protocol with this complexity removed. ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.