Encyclopedia > Security protocol notation

  Article Content

Security protocol notation

Security (engineering) protocol notation is a way of expressing a protocol of correspondance between trusted principles of a dynamic system, such as a computer network. It allows reasoning about the properties of such a system, and provides a formal model[?], to which the BAN logic can be applied.

The standard notation consists of a set of individuals (traditionally named Alice, Bob, Charlie...) who wish to communicate. They may have access to shared keys K, timestamps T, and can generate nonces for authentication purposes.

A simple example might be the following:

<math>A\rightarrow B:\{X\}_{K_{AB}}</math>

This states that Alice intends a message for Bob consisting of a plain text X encrypted under shared key K.

We can express more complicated protocols in such a fashion, see kerberos as an example.



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
Canadian Charter of Rights and Freedoms

... (UK) 1982 it only became law in Canada, not the United Kingdom). It is no accident that the Canadian Charter is similar to the European Convention on Human Rights (ECHR), ...

 
 
 
This page was created in 44.3 ms