DocumentCode :
3144832
Title :
Roles in cryptographic protocols
Author :
Snekkenes, Einar
Author_Institution :
Norwegian Defense Res. Establ., Kjeller, Norway
fYear :
1992
fDate :
4-6 May 1992
Firstpage :
105
Lastpage :
119
Abstract :
In protocols for the distribution of symmetric keys, a principal will usually either take on the role as a session key provider or as a session key user. A principal taking on the role as session key user may also act as the master or the slave. Methods for the analysis of cryptographic protocols that fail to properly handle multiple roles are demonstrated to yield undependable results. A protocol, KP, similar to the Needham and Schroeder symmetric key distribution protocol (1978) is presented. An example is provided to show how a multirole flaw in KP can be utilized by an adversary to obtain a session key. Using a method due to M. Burrows et al. (1989) and P. Bieber (1990) it is shown that KP seems to be suitable for secure key distribution. The approach due to P. Bieber is then modified to facilitate the detection of the class of multirole flaws
Keywords :
cryptography; protocols; KP protocol; cryptographic protocols; secure key distribution; symmetric key distribution protocol; Councils; Cryptographic protocols; Cryptography; Failure analysis; Ice; Logic; Master-slave;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-2825-1
Type :
conf
DOI :
10.1109/RISP.1992.213267
Filename :
213267
Link To Document :
بازگشت