Research Article

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols

Figure 7

Key authentication in Otway-Rees protocol. (a) Otway-Rees protocol. (b) Boyd and Mao’s attack against Otway-Rees protocol. (c) Abadi and Needham’s improved protocol.
(a)
(b)
(c)