saag-1----Page:7
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27 

The Dolev-Yao Intruder Model
D-Y Intruder may:
Intercept/emit messages
Decrypt/encrypt with known key (Black-box perfect crypto)
Split/form messages
Use public information
Generate fresh data
PPT Version