Breaking and fixing the Needham-Schroeder public-key protocol using FDR

825Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.

Abstract

In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small system is secure, then so is a system of arbitrary size.

Cite

CITATION STYLE

APA

Lowe, G. (1996). Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1055, pp. 147–166). Springer Verlag. https://doi.org/10.1007/3-540-61042-1_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free