In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small system is secure, then so is a system of arbitrary size.
CITATION STYLE
Lowe, G. (1996). Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1055, pp. 147–166). Springer Verlag. https://doi.org/10.1007/3-540-61042-1_43
Mendeley helps you to discover research relevant for your work.