IEEE - Institute of Electrical and Electronics Engineers, Inc. - A computational analysis of the Needham-Schroeder-(Lowe) protocol

16th IEEE Computer Security Foundations Workshop

Author(s): B. Warinschi
Sponsor(s): IEEE Comput. Soc. Tech. Committee on Security & Privacy
Publisher: IEEE - Institute of Electrical and Electronics Engineers, Inc.
Publication Date: 1 January 2003
Conference Location: Pacific Grove, CA, USA, USA
Conference Date: 30 June 2003
Page Count: 15
Page(s): 248 - 262
ISBN (Paper): 0-7695-1927-X
ISSN (Paper): 1063-6900
DOI: 10.1109/CSFW.2003.1212717
Regular:

We provide the first computational analysis of the well known Needham-Schroeder-(Lowe) protocol. We show that Lowe's attack to the original protocol can naturally be cast to the... View More

Advertisement