Research Article

ESSM: Formal Analysis Framework for Protocol to Support Algebraic Operations and More Attack Capabilities

Table 1

Symbols in strand space.

SymbolSpecification

AgentRoles involved in protocol operation
Long term symmetric keys of principals A and B
Long term public key of subject a
Long term private key of principal a
Encrypt data x with key K
Connection of data a and B
Protocol intruder