Trust Engineering via Cryptographic Protocols