DocumentCode :
1994235
Title :
Nonmonotonic cryptographic protocols
Author :
Rubin, Aviel D. ; Honeyman, Peter
Author_Institution :
Michigan Univ., Ann Arbor, MI, USA
fYear :
1994
fDate :
14-16 Jun 1994
Firstpage :
100
Lastpage :
116
Abstract :
The paper presents a new method for specifying and analyzing cryptographic protocols. The method offers several advantages over previous approaches. The technique is the first to allow reasoning about nonmonotonic protocols, which are needed for systems that rely on the deletion of information. There is no idealization of protocols; we specify at a level that is close to the actual implementation. We show how the method uncovers the known flaw in the Needham and Schroeder protocol (R.M. Needham and M.D. Schroeder, 1978). We then apply the method to the khat protocol (A.D. Rubin, P. Honeyman, 1993). The analysis reveals a serious, previously undiscovered flaw in the nonmonotonic protocol for long-running jobs
Keywords :
cryptography; nonmonotonic reasoning; protocols; Needham and Schroeder protocol; khat protocol; known flaw; long-running jobs; nonmonotonic cryptographic protocols; reasoning; Body sensor networks; Computer networks; Cryptographic protocols; Cryptography; IP networks; Interference; Logic; Plasma welding; Standards publication; Tiles;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings
Conference_Location :
Franconia, NH
ISSN :
1063-6900
Print_ISBN :
0-8186-6230-1
Type :
conf
DOI :
10.1109/CSFW.1994.315943
Filename :
315943
Link To Document :
بازگشت