ABSTRACT

A Cryptographic Protocol is a sequence of steps that must be per-

formed in a specified order to achieve a particular task. Examples

of such tasks include key agreement, as in the Diffie-Hellman Key

Agreement Protocol , or privacy for wireless networks, as in the

Wireless Equivalent Privacy (WEP) protocol. Increasingly, Cryp-

tographic Protocols are defined to be algorithm independent, only

specifying the methodology for achieving the task in question, not

the underlying algorithms to be used. Cryptographic Protocols are

designed to provide a network with a set of security services. It

is this combination of services that will determine the network’s

security against attacks, either accidental or malicious.