* Travis H.: > IIUC, protocol design _should_ be easy, you just perform some > finite-state analysis and verify that, assuming your primitives are > ideal, no protocol-level operations break it.
Is this still true if you don't know your actual requirements? --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]