An Attack on the Needham-Schroeder Public-Key Authentication Protocol

نویسنده

  • Gavin Lowe
چکیده

In this paper we present an attack upon the Needham Schroeder public key authentication protocol The attack allows an intruder to impersonate another agent

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol

A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe’s attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS pr...

متن کامل

Using Csp for Protocol Analysis: the Needham-schroeder Public-key Protocol

This paper presents a general approach for analysis and veriication of authentication properties in CSP. It is illustrated by an examination of the Needham-Schroeder Public-Key protocol. The paper aims to develop a speciic theory appropriate to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach aims to combine the ability to express such ...

متن کامل

A Reduction for Automated Veri cation of AuthenticationProtocolsScott

Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can (1) perform an unbounded number of encryptions and tuplings while fabricating messages, and (2) prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of a...

متن کامل

A Reduction for Automated Veri cation of Authentication Protocols

Authentication protocols (including protocols that provide key establishment) are designed to work correctly in the presence of an adversary that can prompt honest principals to engage in an unbounded number of concurrent runs of the protocol. The amount of local state maintained by a single run of an authentication protocol is bounded. Intuitively, this suggests that there is a bound on the re...

متن کامل

Monte Carlo Analysis of Security Protocols: Needham-Schroeder Revisited

We apply Monte Carlo model checking to the Needham-Schroeder public key authentication protocol. The Monte Carlo approach uses random sampling of “lassos” (reachable cycles) to compute an estimate of the weighted expectation that a system S satisfies an LTL formula φ within a factor of 1 ± with probability at least 1 − δ. It does so using a number of samples N that is optimal to within a consta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 56  شماره 

صفحات  -

تاریخ انتشار 1995