This document discusses modeling security protocols and proving their properties formally. It describes an operational model that uses traces of events and defines functions over messages to represent encryption and decryption. Properties like authentication and secrecy are modeled as safety properties over these traces. The model supports inductive proofs of protocols and has been used to verify real-world protocols like TLS, though the level of abstraction must be carefully chosen based on the questions being asked.