Limitations on design principles for public key protocols

  • Authors:
  • Paul Syverson

  • Affiliations:
  • Center for High Assurance Computer Systems, Naval Research Laboratory, Washington, DC

  • Venue:
  • SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent papers have taken a new look at cryptographic protocols from the perspective of proposing design principles. For years the main approach to cryptographic protocols has been logical, and a number of papers have examined the limitations of those logics. This paper takes a similar cautionary look at the design principal approach. Limitations and exceptions are offered on some of the previously given basic design principals. The focus is primarily on public key protocols, especially on the order of signature and encryption. But, other principles are discussed as well. Apparently secure protocols that fail to meet principles are presented. Also presented are new attacks on protocols as well as previously claimed attacks which are not.