- Added more explanations.

This commit is contained in:
ccremers 2005-04-15 13:07:57 +00:00
parent 1f8d9dbe5e
commit 89d7fd696a

View File

@ -1,7 +1,15 @@
/*
* Needham-Schroeder protocol
*/
// PKI infrastructure
const pk: Function; const pk: Function;
secret sk: Function; secret sk: Function;
inversekeys (pk,sk); inversekeys (pk,sk);
// The protocol description
protocol ns3(I,R) protocol ns3(I,R)
{ {
role I role I
@ -33,11 +41,19 @@ protocol ns3(I,R)
} }
} }
const Alice,Bob,Eve: Agent; // The agents in the system
const Alice,Bob: Agent;
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve; untrusted Eve;
const ne: Nonce; const ne: Nonce;
compromised sk(Eve); compromised sk(Eve);
// The runs (only needed for the modelchecker algorithm)
run ns3.I(Agent,Agent); run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent); run ns3.R(Agent,Agent);