AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL

被引:329
|
作者
LOWE, G
机构
[1] Oxford University Computing Laboratory, Oxford, OX1 2JD, Wolfson Building, Parks Road
关键词
DISTRIBUTED SYSTEMS; SECURITY IN DIGITAL SYSTEMS; AUTHENTICATION PROTOCOLS; PUBLIC-KEY CRYPTOGRAPHY;
D O I
10.1016/0020-0190(95)00144-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present an attack upon the Needham-Schroeder public-key authentication protocol. The attack allows an intruder to impersonate another agent.
引用
收藏
页码:131 / 133
页数:3
相关论文
共 50 条
  • [1] Model checking analysis of needham-schroeder public-key protocol
    Zhang, Yu-Qing
    Wang, Lei
    Xiao, Guo-Zhen
    Wu, Jian-Ping
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1348 - 1352
  • [2] Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    Lowe, G
    SOFTWARE-CONCEPTS AND TOOLS, 1996, 17 (03): : 93 - 102
  • [3] Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
    Meadows, C.A.
    Lecture Notes in Computer Science, 1996, 1146
  • [4] Improvement and security analysis on symmetric key authentication protocol Needham-Schroeder
    Liu, Simin
    Ye, Junyao
    Wang, Yinglian
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1289 - 1293
  • [5] A parameterized analysis of public-key protocols:Needham-Schroeder and Kerberos-5
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 294 - +
  • [6] Using backward strategy to the Needham-Schroeder public key protocol verification
    Kurkowski, M
    Mackow, M
    ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 249 - 259
  • [7] Formal analysis of Needham-Schroeder protocol
    Wang, Gui-Lin
    Qing, Si-Han
    Zhou, Zhan-Fei
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (SUPPL.): : 86 - 92
  • [8] Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events
    Xiao, M. H.
    Deng, C. Y.
    Ma, C. L.
    Zhu, K.
    Cheng, D. L.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 379 - 383
  • [9] Protocol Derivation System for the Needham-Schroeder family
    Zhang, Junwei
    Ma, Jianfeng
    Yang, Chao
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2687 - 2703
  • [10] Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
    Nesi, Monica
    Rucci, Giuseppina
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 135 (01) : 95 - 114