메뉴 건너뛰기




Volumn 17, Issue 3, 1996, Pages 93-102

Breaking and fixing the Needham-Schroeder public-key protocol using FDR

Author keywords

Authentication protocol; Cryptography; Failures Divergency Refinement Checker; FDR; Needham Schroeder public key protocol; Protocol; Protocol failure; Security

Indexed keywords


EID: 26444574191     PISSN: 09458115     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (119)

References (15)
  • 1
    • 0025522255 scopus 로고
    • Hidden Assumptions in Cryptographic Protocols
    • November
    • Boyd C (November 1990) Hidden Assumptions in Cryptographic Protocols. Proceedings of the IEE, 137, Part E(6):433-436
    • (1990) Proceedings of the IEE , vol.137 , Issue.6 PART E , pp. 433-436
    • Boyd, C.1
  • 2
    • 0004215976 scopus 로고
    • A Logic of Authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, 1989
    • Burrows M, Abadi M, Needham R (1989) A Logic of Authentication. Proceedings of the Royal Society of London A, 426:233-271 (A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, 1989)
    • (1989) Proceedings of the Royal Society of London A , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 4
    • 84976665942 scopus 로고
    • Timestamps in Key Distribution Protocols
    • Denning DE, Sacco GM (1981) Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8):533-536
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 8
    • 28144456308 scopus 로고
    • An Attack on the Needham-Schroeder Public-Key Authentication Protocol
    • Lowe G (1995) An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 56:131-133
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 9
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • Needham R, Schroeder M (1978) Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 10
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • February
    • Rivest RL, Shamir A, Adleman L (February 1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.