Casper files for the Yahalom Protocol
This directory contains Casper input files for the Yahalom Protocol from
[BAN89].
In the input files, the third and fourth messages are split into two messages
each, to limit the state space.
References:
[BAN89]
Michael Burrows, Martín Abadi, and Roger Needham.
A logic of authentication.
Proceedings of the Royal Society of London A, 426:233-271,
1989.
Also available as Digital Equipment Corporation
Systems Research Center report No. 39, 1989.
[Syv94]
Paul Syverson.
A taxonomy of replay attacks.
In Proceedings of the 7th IEEE Computer Security Foundations
Workshop, pages 131--136, 1994.