AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL

被引:329
|
作者
LOWE, G
机构
[1] Oxford University Computing Laboratory, Oxford, OX1 2JD, Wolfson Building, Parks Road
关键词
DISTRIBUTED SYSTEMS; SECURITY IN DIGITAL SYSTEMS; AUTHENTICATION PROTOCOLS; PUBLIC-KEY CRYPTOGRAPHY;
D O I
10.1016/0020-0190(95)00144-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present an attack upon the Needham-Schroeder public-key authentication protocol. The attack allows an intruder to impersonate another agent.
引用
收藏
页码:131 / 133
页数:3
相关论文
共 50 条
  • [21] A client puzzle based public-key authentication protocol
    Fung, CK
    Lee, MC
    Wong, MY
    SMART NETWORKS, 2002, 84 : 263 - 277
  • [22] Safe simplifying transformations for security protocols or not just the needham schroeder public key protocol
    Hui, ML
    Lowe, G
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 32 - 43
  • [23] Safe simplifying transformations for security protocols or not just the Needham Schroeder public key protocol
    Univ of Leicester, Leicester, United Kingdom
    Proc Comput Secur Found Workshop, (32-43):
  • [24] Needham-Schroeder协议分析及改进的方案
    邓永江
    铜陵学院学报, 2006, (03) : 86 - 87
  • [25] Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
    Natl Univ of Singapore, Singapore
    Int Symp Parall Archit Algorithms Networks I SPAN, (364-369):
  • [26] Mobile IP registration protocol: A security attack and new secure minimal public-key based authentication
    Sufatrio
    Lam, KY
    FOURTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN'99), PROCEEDINGS, 1999, : 364 - 369
  • [27] An Image Based Authentication System-Using Needham Schroeder Protocol
    Kumar, Raman
    Puri, Asmita
    Gautam, Vivek
    Singla, Saumya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 135 - 140
  • [28] 基于Strand模型的Needham-Schroeder协议分析
    贾立伟
    周清雷
    赵东明
    微计算机信息, 2008, (27) : 37 - 39
  • [29] A denial-of-service resistant public-key authentication and key establishment protocol
    Fung, CK
    Lee, MC
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
  • [30] A public-key based authentication and key establishment protocol coupled with a client puzzle
    Lee, MC
    Fung, CK
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823