DocumentCode
1340465
Title
Hidden assumptions in cryptographic protocols
Author
Boyd, C.
Author_Institution
Electr. Eng. Lab., Manchester Univ., UK
Volume
137
Issue
6
fYear
1990
fDate
11/1/1990 12:00:00 AM
Firstpage
433
Lastpage
436
Abstract
It is shown that some well known cryptographic protocols for authentication are insecure if the underlying cryptographic algorithm does not avoid certain special features. Explicit assumptions based on the fundamental properties of cryptographic transformations are recommended as a basis for cryptographic protocol design. It is shown how these properties may be used to design alternative forms of the protocols analysed.
Keywords
cryptography; protocols; assumptions; authentication; cryptographic protocols;
fLanguage
English
Journal_Title
Computers and Digital Techniques, IEE Proceedings E
Publisher
iet
ISSN
0143-7062
Type
jour
Filename
60351
Link To Document