DocumentCode :
3318694
Title :
Extending NCP for protocols using public keys
Author :
Rubin, Aviel D.
Author_Institution :
Bellcore, Morristown, NJ, USA
fYear :
1995
fDate :
20-23 Sep 1995
Firstpage :
94
Lastpage :
104
Abstract :
This paper presents extensions to a technique for specifying and analyzing nonmonotonic cryptographic protocols (NCP) that use asymmetric keys. We introduce new actions and inference rules, as well as slight modifications to the update function. An important observation is that reasoning about the origin of messages is quite different when dealing with asymmetric key protocols. We also introduce the notion that keys in certificates should be bound to the principals receiving them. We extend the technique to meet the binding requirements and show how the flaw in the Denning and Sacco (1981) public key protocol, that was discovered by Abadi and Needham (1994), is revealed. We demonstrate the extended technique using one protocol of our own and the Needham and Schroeder (1978) public key protocol. Finally, we introduce and analyze a fix to a known weakness in Needham and Schroeder´s protocol using our extended technique
Keywords :
nonmonotonic reasoning; protocols; public key cryptography; asymmetric keys; binding requirements; certificates; inference rules; nonmonotonic cryptographic protocols; principals; public key protocol; update function; Cryptographic protocols; Plasma welding; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
0-8186-7180-7
Type :
conf
DOI :
10.1109/ICCCN.1995.540107
Filename :
540107
Link To Document :
بازگشت