Table 10 Output of formal analysis by using ProVerif tool.
Query 1 | Attacker (Key/Data) (confidentiality of Key/Data) |
---|---|
Result | Yes. |
Explanation | The key is confidential from the attacker. Data cannot be intercepted from vulnerable channel |
Query 2 | Attacker (Data) (confidentiality of Data) |
Result | No. |
Explanation | Data can be intercepted from vulnerable channel |
Query 3 | Injective correspondence on Request -> Response (authentication) |
Result | Yes. |
Explanation | The response has a corresponding legitimate request, ensuring data authenticity by using highly secure protocol. |