Environmental requirements for authentication protocols

15Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most work on requirements in the area of authentication protocols has concentrated on identifying requirements for the protocol without much consideration of context. Little work has concentrated on assumptions about the environment, for example, the applications that make use of authenticated keys. We will show in this paper how the interaction between a protocol and its environment can have a major effect on a protocol. Specifically we will demonstrate a number of attacks on published and/or widely used protocols that are not feasible against the protocol running in isolation (even with multiple runs) but become feasible in some application environments. We will also discuss the tradeoff between putting constraints on a protocol and putting constraints on the environment in which it operates. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Canetti, R., Meadows, C., & Syverson, P. (2003). Environmental requirements for authentication protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 339–355. https://doi.org/10.1007/3-540-36532-x_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free