1.
Describing the protocol in standard cryptographic notation, also known as Alice-Bob
notation. Information on this notation can be found at
https://en.wikipedia.org/wiki/Security_protocol_notation
and
https://en.wikipedia.org/wiki/Message_sequence_chart.
2. Talk about the weakness or vulnerabilities of the protocol if any. If exists, how to improve
the security posture of that protocol.
*** Protocol description and analysis (for Part 1):
Protocol description: required to provide a graphical description of the protocol as
Alice-Bob notation.
• Security properties: A description of what is the security property that the protocol
intends to achieve.
Discussion of weakness: Discuss if there exists any vulnerability within the protocol.
• Justification: Improve if there is any flaw and then add an explanation of why the
protocol does satisfy the intended security property.
Fig: 1