Title :
Extending NCP for protocols using public keys
Author_Institution :
Bellcore, Morristown, NJ, USA
Abstract :
This paper presents extensions to a technique for specifying and analyzing nonmonotonic cryptographic protocols (NCP) that use asymmetric keys. We introduce new actions and inference rules, as well as slight modifications to the update function. An important observation is that reasoning about the origin of messages is quite different when dealing with asymmetric key protocols. We also introduce the notion that keys in certificates should be bound to the principals receiving them. We extend the technique to meet the binding requirements and show how the flaw in the Denning and Sacco (1981) public key protocol, that was discovered by Abadi and Needham (1994), is revealed. We demonstrate the extended technique using one protocol of our own and the Needham and Schroeder (1978) public key protocol. Finally, we introduce and analyze a fix to a known weakness in Needham and Schroeder´s protocol using our extended technique
Keywords :
nonmonotonic reasoning; protocols; public key cryptography; asymmetric keys; binding requirements; certificates; inference rules; nonmonotonic cryptographic protocols; principals; public key protocol; update function; Cryptographic protocols; Plasma welding; Public key; Public key cryptography;
Conference_Titel :
Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-8186-7180-7
DOI :
10.1109/ICCCN.1995.540107