An Attack on the Needham-Schroeder Public-Key Authentication Protocol
نویسنده
چکیده
In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to impersonate another agent
منابع مشابه
Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol
A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe’s attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS pr...
متن کاملUsing Csp for Protocol Analysis: the Needham-schroeder Public-key Protocol
This paper presents a general approach for analysis and veriication of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a speciic theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such ...
متن کاملA Reduction for Automated Veri cation of AuthenticationProtocolsScott
Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can (1) perform an unbounded number of encryptions and tuplings while fabricating messages, and (2) prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of a...
متن کاملA Reduction for Automated Veri cation of Authentication Protocols
Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of an authentication protocol is bounded. Intuitively, this suggests that there is a bound on the re...
متن کاملMonte Carlo Analysis of Security Protocols: Needham-Schroeder Revisited
We apply Monte Carlo model checking to the Needham-Schroeder public key authentication protocol. The Monte Carlo approach uses random sampling of “lassos” (reachable cycles) to compute an estimate of the weighted expectation that a system S satisfies an LTL formula φ within a factor of 1 ± with probability at least 1 − δ. It does so using a number of samples N that is optimal to within a consta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 56 شماره
صفحات -
تاریخ انتشار 1995