DocumentCode :
1650094
Title :
A computational analysis of the Needham-Schroeder-(Lowe) protocol
Author :
Warinschi, Bogdan
Author_Institution :
Dept. of Comput. Sci. & Eng., California Univ., San Diego, CA, USA
fYear :
2003
Firstpage :
248
Lastpage :
262
Abstract :
We provide the first computational analysis of the well known Needham-Schroeder-(Lowe) protocol. We show that Lowe´s attack to the original protocol can naturally be cast to the computational framework. Then we prove that chosen-plaintext security for encryption schemes is not sufficient to ensure soundness of formal proofs with respect to the computational setting, by exhibiting an attack against the corrected version of the protocol implemented using an ElGamal encryption scheme. Our main result is a proof that, when implemented using an encryption scheme that satisfies indistinguishability under chosen-ciphertext attack, the Needham-Schroeder-Lowe protocol is indeed a secure mutual authentication protocol. The technicalities of our proof reveal new insights regarding the relation between formal and computational models for system security.
Keywords :
access protocols; authorisation; cryptography; ElGamal encryption; Lowe protocol; Needham-Schroeder protocol; authentication protocol; chosen-ciphertext attack; chosen-plaintext security; computational analysis; Authentication; Computational modeling; Computer science; Context modeling; Cryptographic protocols; Drives; Engineering profession; History; Public key cryptography; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE
ISSN :
1063-6900
Print_ISBN :
0-7695-1927-X
Type :
conf
DOI :
10.1109/CSFW.2003.1212717
Filename :
1212717
Link To Document :
بازگشت