Contamination in Cryptographic Protocols