Encyclopedia > Security protocol notation

  Article Content

Security protocol notation

Security (engineering) protocol notation is a way of expressing a protocol of correspondance between trusted principles of a dynamic system, such as a computer network. It allows reasoning about the properties of such a system, and provides a formal model[?], to which the BAN logic can be applied.

The standard notation consists of a set of individuals (traditionally named Alice, Bob, Charlie...) who wish to communicate. They may have access to shared keys K, timestamps T, and can generate nonces for authentication purposes.

A simple example might be the following:

<math>A\rightarrow B:\{X\}_{K_{AB}}</math>

This states that Alice intends a message for Bob consisting of a plain text X encrypted under shared key K.

We can express more complicated protocols in such a fashion, see kerberos as an example.



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
Quioque, New York

... children under the age of 18 living with them, 42.6% are married couples living together, 11.9% have a female householder with no husband present, and 42.6% ar ...

 
 
 
This page was created in 23.1 ms