Limitations on design principles for public key protocols
- 23 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Recent papers have taken a new look at cryptographic protocols from the perspective of proposing design principles. For years, the main approach to cryptographic protocols has been logical, and a number of papers have examined the limitations of those logics. This paper takes a similar cautionary look at the design principle approach. Limitations and exceptions are offered on some of the previously given basic design principals. The focus is primarily on public key protocols, especially on the order of signature and encryption, but other principles are discussed as well. Apparently secure protocols that fail to meet principles are presented. Also presented are new attacks on protocols as well as previously claimed attacks which are not Author(s) Syverson, P. Centre for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USAKeywords
This publication has 27 references indexed in Scilit:
- Logics for cryptographic protocols-virtues and limitationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The use of logic in the analysis of cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Optimal authentification protocols resistant to password guessing attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The design and implementation of a secure auction servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Eurocrypt’92 Controversial Issue Trapdoor Primes and ModuliPublished by Springer Nature ,2001
- Undetectable on-line password guessing attacksACM SIGOPS Operating Systems Review, 1995
- Formal requirements for key distribution protocolsPublished by Springer Nature ,1995
- Adding time to a logic of authenticationPublished by Association for Computing Machinery (ACM) ,1993
- Separating the specification and implementation phases in cryptologyPublished by Springer Nature ,1992
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985