next up previous
Next: Role Extraction Up: A New Algorithm for Previous: Basics

Informal Presentation

Starting from a protocol description, the algorithm operates in three main steps:

 (a) & Role extraction \\  (b) & Proof system generation \\  (c) & Verification

In the sequel, we will motivate, explain and illustrate each of these three steps. The illustration will be carried out on the Woo and Lam authentication protocol.