메뉴 건너뛰기




Volumn 135, Issue 1, 2005, Pages 95-114

Formalizing and analyzing the Needham-Schroeder symmetric-key protocol by rewriting

Author keywords

Protocol verification; Rewriting strategy; Term rewriting; Tree automata

Indexed keywords

COMPUTER HARDWARE DESCRIPTION LANGUAGES; CRYPTOGRAPHY; KNOWLEDGE ENGINEERING; MATHEMATICAL MODELS; THEOREM PROVING;

EID: 23144457408     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.06.002     Document Type: Conference Paper
Times cited : (6)

References (37)
  • 1
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols
    • M. Abadi, and A.D. Gordon A Calculus for Cryptographic Protocols Journal of the ACM 148 1 1999 1 70
    • (1999) Journal of the ACM , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 4
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • Proceedings ESORICS 2003 Springer-Verlag
    • Basin, D., S. Mödersheim and L. Viganò, An On-The-Fly Model-Checker for Security Protocol Analysis, in Proceedings ESORICS 2003, Lecture Notes in Computer Science, Vol. 2808, Springer-Verlag, 253-270
    • Lecture Notes in Computer Science , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 6
    • 84958749546 scopus 로고    scopus 로고
    • From secrecy to authenticity in security protocols
    • Proceedings SAS'02 Springer-Verlag
    • Blanchet, B., From Secrecy to Authenticity in Security Protocols, in Proceedings SAS'02, Lecture Notes in Computer Science, Vol. 2477, Springer-Verlag, 342-359
    • Lecture Notes in Computer Science , vol.2477 , pp. 342-359
    • Blanchet, B.1
  • 11
    • 84949232265 scopus 로고    scopus 로고
    • Specifying authentication protocols using rewriting and strategies
    • Proceedings PADL 2001 Springer-Verlag
    • Cirstea, H., Specifying Authentication Protocols Using Rewriting and Strategies, in Proceedings PADL 2001, Lecture Notes in Computer Science, Vol. 1990, Springer-Verlag, 138-152
    • Lecture Notes in Computer Science , vol.1990 , pp. 138-152
    • Cirstea, H.1
  • 15
    • 84976665942 scopus 로고
    • Timestamps in key distributed protocols
    • D. Denning, and G. Sacco Timestamps in key distributed protocols Communications of the ACM 24 8 1981 533 535
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-535
    • Denning, D.1    Sacco, G.2
  • 17
    • 84958742938 scopus 로고    scopus 로고
    • Decidable approximations of sets of descendants and sets of normal forms
    • Proceedings RTA 1998 Springer-Verlag
    • Genet, T., Decidable Approximations of Sets of Descendants and Sets of Normal Forms, in Proceedings RTA 1998, Lecture Notes in Computer Science, Vol. 1379, Springer-Verlag, 151-165
    • Lecture Notes in Computer Science , vol.1379 , pp. 151-165
    • Genet, T.1
  • 18
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • Proceedings CADE 2000 Springer-Verlag
    • Genet, T., and F. Klay, Rewriting for Cryptographic Protocol Verification, in Proceedings CADE 2000, Lecture Notes in Artificial Intelligence, Vol. 1831, Springer-Verlag, 271-290
    • Lecture Notes in Artificial Intelligence , vol.1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 19
    • 84937398672 scopus 로고    scopus 로고
    • Reachability analysis of term rewriting systems with Timbuk
    • Proceedings LPAR 2001 Springer-Verlag
    • Genet, T., and V. Viet Triem Tong, Reachability Analysis of Term Rewriting Systems with Timbuk, in Proceedings LPAR 2001, Lecture Notes in Artificial Intelligence, Vol. 2250, Springer-Verlag, 695-706
    • Lecture Notes in Artificial Intelligence , vol.2250 , pp. 695-706
    • Genet, T.1    Tong, V.V.T.2
  • 20
    • 23144435679 scopus 로고    scopus 로고
    • A strategy to deal with divergent rewrite systems
    • Proceedings CTRS 1992 Springer-Verlag
    • Inverardi, P., and M. Nesi, A Strategy to Deal with Divergent Rewrite Systems, in Proceedings CTRS 1992, Lecture Notes in Computer Science, Vol. 656, Springer-Verlag, 458-467
    • Lecture Notes in Computer Science , vol.656 , pp. 458-467
    • Inverardi, P.1    Nesi, M.2
  • 21
    • 18744406797 scopus 로고    scopus 로고
    • Semi-equational rewriting for divergent rewrite systems
    • Dept. of Pure and Applied Mathematics, University of L'Aquila, July
    • Inverardi, P., and M. Nesi, Semi-equational Rewriting for Divergent Rewrite Systems, Technical Report No. 113, Dept. of Pure and Applied Mathematics, University of L'Aquila, July 1996
    • (1996) Technical Report No. 113 , vol.113
    • Inverardi, P.1    Nesi, M.2
  • 24
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proceedings TACAS 1996 Springer-Verlag
    • Lowe, G., Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR, in Proceedings TACAS 1996, Lecture Notes in Computer Science, Vol. 1055, Springer-Verlag, 147-166
    • Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 25
    • 20144369157 scopus 로고    scopus 로고
    • Technical Report Dept. of Mathematics and Computer Science, University of Leicester, January
    • Lowe, G., A Family of Attacks upon Authentication Protocols, Technical Report 1997/5, Dept. of Mathematics and Computer Science, University of Leicester, January 1997
    • (1997) A Family of Attacks upon Authentication Protocols , vol.1997 , Issue.5
    • Lowe, G.1
  • 26
    • 84949740740 scopus 로고    scopus 로고
    • Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    • Proceedings ESORICS 1996 Springer-Verlag
    • Meadows, C.A., Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches, in Proceedings ESORICS 1996, Lecture Notes in Computer Science, Vol. 1146, Springer-Verlag, 351-364.
    • Lecture Notes in Computer Science , vol.1146 , pp. 351-364
    • Meadows, C.A.1
  • 28
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • Proceedings SAS 1999 Springer-Verlag
    • Monniaux, D., Abstracting Cryptographic Protocols with Tree Automata, in Proceedings SAS 1999, Lecture Notes in Computer Science, Vol. 1694, Springer-Verlag, 149-163
    • Lecture Notes in Computer Science , vol.1694 , pp. 149-163
    • Monniaux, D.1
  • 29
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R.M. Needham, and M.D. Schroeder Using Encryption for Authentication in Large Networks of Computers Communications of the ACM 21 12 1978 993 999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 31
    • 18744387760 scopus 로고    scopus 로고
    • A Rewriting Strategy for Protocol Verification
    • Final Proceedings WRS'03
    • M. Nesi, G. Rucci, and M. Verdesca A Rewriting Strategy for Protocol Verification Final Proceedings WRS'03 Electronic Notes in Theoretical Computer Science 86 4 2003 URL http://www.sciencedirect.com/science/journal/15710661
    • (2003) Electronic Notes in Theoretical Computer Science , vol.86 , Issue.4
    • Nesi, M.1    Rucci, G.2    Verdesca, M.3
  • 32
    • 23144458630 scopus 로고    scopus 로고
    • Ph.D. Thesis, Dublin City University, School of Computing (in preparation)
    • Oehl, F., "Formal Verification of Cryptographic Protocols", Ph.D. Thesis, Dublin City University, School of Computing, 2005 (in preparation)
    • (2005) Formal Verification of Cryptographic Protocols
    • Oehl, F.1
  • 35
    • 0030705795 scopus 로고    scopus 로고
    • Proving Properties of Security Protocols by Induction
    • IEEE Computer Society Press
    • L. Paulson Proving Properties of Security Protocols by Induction Proceedings 10th Computer Security Foundations Workshop 1997 IEEE Computer Society Press 70 83
    • (1997) Proceedings 10th Computer Security Foundations Workshop , pp. 70-83
    • Paulson, L.1
  • 36
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • L.C. Paulson The Inductive Approach to Verifying Cryptographic Protocols Journal of Computer Security 6 1998 85 128
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 37
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • Proceedings CADE 1999 Springer-Verlag
    • Weidenbach, C., Towards an Automatic Analysis of Security Protocols in First-Order Logic, in Proceedings CADE 1999, Lecture Notes in Artificial Intelligence, Vol. 1632, Springer-Verlag, 314-328
    • Lecture Notes in Artificial Intelligence , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.