Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Table 1

The trace of function return values of protocol implementations.

ā€‰12345678910111213141516171819202122

INS ()80113621614417653519212812812812820811682161648531192
MANS ()1121216216176208535801281281281282401187216488053147
INSL ()80113621614417653519212812812812820811752161648531200
MANSL ()11212402161762085358012812812812824011782164880531147

ā€‰23242526272829303132333435363738394041424344

INS ()12812812812817620853520812812817324100128128244191001
MANS ()1281281282082082405351281281281281280001216002160
INSL ()128128128128176208535208128210210244160128128244149001
MANSL ()1281281281282082405351281281281281280001216002160