* A Logic of Authentication * Authors: M. Burrows, M. Abadi, R. Needham * Field: OS/Security Questions: Why do the authors claim that the double encryption in the Kerberos protocol is unnecessary for the second message (p.6)? Answer: Could simply be appended instead of encrypted again. But this redundancy is not necessarily obvious from the logic itself.