We use two intruders to attack each protocol. The intruder tries to impersonate the initiator , and the other intruder attempts to impersonate the responder . Both intruders have the public keys of all the principals in their initial information. If symmetric encryption is used, the intruders certainly do not obtain any of the secret keys. Then, tries to start a session with impersonating as . If can get to finish his session believing it is talking to , then the protocol is simply broken. Similarly we can check whether can impersonate as to finish a session with . The purpose for this attack is simply to check whether correct and necessary encryptions are used. It does not involve any replay attack and multiple protocol run and hence is very efficient.