ABSTRACT
A Cryptographic Protocol is a sequence of steps that must be per-
formed in a specified order to achieve a particular task. Examples
of such tasks include key agreement, as in the Diffie-Hellman Key
Agreement Protocol , or privacy for wireless networks, as in the
Wireless Equivalent Privacy (WEP) protocol. Increasingly, Cryp-
tographic Protocols are defined to be algorithm independent, only
specifying the methodology for achieving the task in question, not
the underlying algorithms to be used. Cryptographic Protocols are
designed to provide a network with a set of security services. It
is this combination of services that will determine the network’s
security against attacks, either accidental or malicious.