Cryptographic protocols for key distribution and authentication play an important role in Internet security. Certain flaws in these protocols can be discovered using term rewriting models to express the protocol, the malicious network environment, and vulnerability search strategies.