“…The Initial Phase of the Kim-Jo-Kim-Won Protocol [39] can be expressed in the language of the logic as follows: Applying the Attack Detection Logic reveals the following weaknesses: Rule R2.2 is activated twice, as H(g,NU) and H(H(g,NU),KUTTP) from S1 are symmetric in opposite direction to H(g,NS) and H(H(g,NS),KSTTP) from S2. Also, R4.1 is activated twice, as {H(g,NU) ,H(g,NS), n,H(NTTP)}KUTTP and {H(g,NU), H(g,NS)}H(H(g,NU), H(g,NS)) from S4 are not strong sender bound.…”