- Added more explanations.

This commit is contained in:
ccremers 2005-04-15 13:07:57 +00:00
parent 1f8d9dbe5e
commit 89d7fd696a

View File

@ -1,7 +1,15 @@
/*
* Needham-Schroeder protocol
*/
// PKI infrastructure
const pk: Function;
secret sk: Function;
inversekeys (pk,sk);
// The protocol description
protocol ns3(I,R)
{
role I
@ -33,11 +41,19 @@ protocol ns3(I,R)
}
}
const Alice,Bob,Eve: Agent;
// The agents in the system
const Alice,Bob: Agent;
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve;
const ne: Nonce;
compromised sk(Eve);
// The runs (only needed for the modelchecker algorithm)
run ns3.I(Agent,Agent);
run ns3.R(Agent,Agent);