\documentclass{article}\usepackage{../style}\usepackage{../langs}\usetikzlibrary{patterns,decorations.pathreplacing}\begin{document}\section*{Handout 5 (Protocols)}The protocols we are interested here are generic descriptionsof how to exchange messages in order to achieve a goal, be itestablishing a mutual secure connection or being able toauthenticate to a system. Our notion of protocol isdeliberately quite general: it includes situations like themessages send between a key fob and a car in order to opendoors or the messages that participants need to exchange inorder to mine Bitcoins (which is often already called Bitcoin\emph{protocol}).Unlike the distant past where for example we had to meet aperson in order to authenticate him or her (via a passport forexample), the problem we are facing is that on the Internet wecannot easily be sure who we are ``talking'' to. The obviousreason is that only some electrons arrive at our computer; wedo not see the person, or computer, behind the incomingelectrons. Often there are is also no person behind themessages, rather than a computer system.Keyfobs - protocol{\small\url{http://www.cs.ru.nl/~rverdult/Gone_in_360_Seconds_Hijacking_with_Hitag2-USENIX_2012.pdf}}attack such protocols because they use weak ciphers (Oystercard)\end{document}%%% Local Variables: %%% mode: latex%%% TeX-master: t%%% End: