# Woo and Lam Pi # # Modelled after the description in the SPORE library # http://www.lsv.ens-cachan.fr/spore/wooLamPi.html # # Note: # Scyther finds an attack that appears to be legit, but is not present in # SPORE. # protocol woolamPi(I,R,S) { role I { var Nr: Nonce; send_1(I,R, I); read_2(R,I, Nr); send_3(I,R, {Nr}k(I,S)); } role R { fresh Nr: Nonce; var T: Ticket; read_1(I,R, I); send_2(R,I, Nr); read_3(I,R, T); send_4(R,S, {I, T}k(R,S)); read_5(S,R, {Nr}k(R,S)); claim_R1(R,Nisynch); } role S { var Nr: Nonce; read_4(R,S, {I,{Nr}k(I,S)}k(R,S)); send_5(S,R, {Nr}k(R,S)); } }