Security Protocols XX

Volume 7622 of the series Lecture Notes in Computer Science pp 60-63

The Casino and the OODA Loop

Why Our Protocols Always Eventually Fail
  • Sandy ClarkAffiliated withUniversity of Pennsylvania
  • , Matt BlazeAffiliated withUniversity of Pennsylvania
  • , Jonathan M. SmithAffiliated withUniversity of Pennsylvania

* Final gross prices may vary according to local VAT.

Get Access


Security protocols are almost always part of an iterated game, but existing abstractions don’t model this behavior. Models for such systems have been developed in other contexts, and we propose the use of one, John Boyd’s Observe-Orient-Decide-Act (OODA) Loop, as appropriate for the security context.