Jump to content

Security protocol notation

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Rick.G (talk | contribs) at 22:35, 20 May 2003 (Protocol notation didn't really belong with BAN logic). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Security (engineering) protocol notation is a way of expressing a protocol of correspondance between trusted principles of a dynamic system, such as a computer network. It allows reasoning about the properties of such a system, and provides a formal model, to which the BAN logic can be applied.

The standard notation consists of a set of individuals (traditionally named Alice, Bob, Charlie...) who wish to communicate. They may have access to shared keys K, timestamps T, and can generate nonces for authentication purposes.

A simple example might be the following:

This states that Alice intends a message for Bob consisting of a message X encrypted under shared key K.

We can express more complicated protocols in such a fashion, see kerberos as an example.