An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Using encryption for authentication in large networks of computers
Communications of the ACM
Integrity Primitives for Secure Information Systems: Final Ripe Report of Race Integrity Primitives Evaluation
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Classification of Authentication Protocols: A Practical Approach
ISW '00 Proceedings of the Third International Workshop on Information Security
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Hi-index | 0.00 |
We consider a recently described attack on a key establishment protocol contained in a draft international standard. Based on an observation as to why the attack is possible, we propose a simple modification to the protocol which avoids the attack.