Something that looks like a protocol but does not accomplish a task is not a protocol—it’s a waste of time.
Bruce Schneier (1996). “Applied cryptography: protocols, algorithms, and source code in C”, John Wiley & Sons Inc