next up previous
Next: Role Extraction Up: A New Algorithm for Previous: Basics

Informal Presentation

Starting from a protocol description, the algorithm operates in three main steps:

$\textstyle\parbox{8cm}{
 \begin{tabular}
{ll}
 (a) & Role extraction \\  (b) & Proof system generation \\  (c) & Verification
 \end{tabular}}$

In the sequel, we will motivate, explain and illustrate each of these three steps. The illustration will be carried out on the Woo and Lam authentication protocol.