A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol

24Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract cryptographic library, which is a provably secure abstraction of a real cryptographic library. Together with composition and integrity preservation theorems from the underlying model, this allows us to perform the actual proof effort in a deterministic setting corresponding to a slightly extended Dolev-Yao model. Our proof is one of the two first independent cryptographically sound security proofs of this protocol. It is the first protocol proof over an abstract Dolev-Yao-style library that is in the scope of formal proof tools and that automatically yields cryptographic soundness. We hope that it paves the way for the actual use of automatic proof tools for this and many similar cryptographically sound proofs of security protocols. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Backes, M., & Pfitzmann, B. (2003). A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2914, 1–12. https://doi.org/10.1007/978-3-540-24597-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free