1. NS.

Take the ns.scm file and the Makefile from http://web.cs.wpi.edu/~guttman/cs564/exercise/ns.scm and http://web.cs.wpi.edu/~guttman/cs564/exercise/Makefile. It has a protocol definition and a single defskeleton to make just one query.

2. NSL.

Create a new file nsl.scm, editing the NS protocol definition to define NSL and fix the authentication problem.

3. PS.

Retrieve the file http://web.cs.wpi.edu/~guttman/cs564/exercise/ps.scm, with the Perrig-Song example.

4. Otway-Rees.

Work with the file http://web.cs.wpi.edu/~guttman/cs564/exercise/or.scm.

5. Abadi-Needham’s Otway-Rees.

Look at p. 13 of the Abadi-Needham paper. It describes an alternate form of Otway-Rees with much less encryption. (More or less the same protocol was also proposed by Ulf Carlsen.)

6. Woo-Lam.

Work with the file http://web.cs.wpi.edu/~guttman/cs564/exercise/woo_lam.scm.


This document was translated from LATEX by HEVEA.