Casper files for the Yahalom Protocol


This directory contains Casper input files for the Yahalom Protocol from [BAN89]. In the input files, the third and fourth messages are split into two messages each, to limit the state space.

References:

[BAN89] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. Also available as Digital Equipment Corporation Systems Research Center report No. 39, 1989.

[Syv94] Paul Syverson. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, pages 131--136, 1994.