Hidden assumptions in cryptographic protocols
- 1 January 1990
- journal article
- Published by Institution of Engineering and Technology (IET) in IEE Proceedings E Computers and Digital Techniques
- Vol. 137 (6) , 433-436
- https://doi.org/10.1049/ip-e.1990.0054
Abstract
It is shown that some well known cryptographic protocols for authentication are insecure if the underlying cryptographic algorithm does not avoid certain special features. Explicit assumptions based on the fundamental properties of cryptographic transformations are recommended as a basis for cryptographic protocol design. It is shown how these properties may be used to design alternative forms of the protocols analysed.Keywords
This publication has 1 reference indexed in Scilit:
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978