Roles in Cryptographic Protocols

  • Authors:
  • Einer Snekkenes

  • Affiliations:
  • -

  • Venue:
  • SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

ln protocols for the distribution of symmetric keys, aprincipal will usually either take on the role as a session key provider or-as a session key user. A principaltaking on the role as session key user may also act asthe master or the slave. We show that methods fop theanalysis of cryptographic protocols that fail to properlyhandle multiple roles do not yield dependable results.We present a protocol KP, similar to the Needhamand Schroeder symmetric hey distribution protocol. Bymeans of an example, we then show how a multi roleflaw in KP can be utilized by an adversary to obtaina session key.Using a method due to Burrows, Abadi and Needham [3], and the one due to Bieber [1], we show that KP seems to be suitable for secure key distribution. Finally, the approach due to Bieber is modified facilitate the detection of the class of multi role flaws