Two example protocols are now considered in the light of the goals examined above. These have been chosen particularly because they have given rise to controversy in the literature about what they achieve and what attacks are valid.