Filters








333 Hits in 8.1 sec

Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches [chapter]

Catherine A. Meadows
<span title="">1996</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper we contrast the use of the NRL Protocol Analyzer and Gavin Lowe's use of the model checker FDR 7 to analyze the Needham-Schroeder public key protocol.  ...  This is used as a basis to compare and contrast the two systems and to point out possible future directions for research.  ...  6 Acknowledgements I w ould like to thank Bill Roscoe for suggesting that I apply the NRL Protocol Analyzer to the Needham-Schroeder public key protocol, and Gavin Lowe for useful discussions on his use  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-61770-1_46">doi:10.1007/3-540-61770-1_46</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hdtgkqf7qfclpdxkk7gut64usy">fatcat:hdtgkqf7qfclpdxkk7gut64usy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170222153635/http://www.dtic.mil/dtic/tr/fulltext/u2/a465136.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/69/d869d6d666c3d0c2e22602f90b1aa2807bfc81ce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-61770-1_46"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Specifying Authentication Protocols Using Rewriting and Strategies [chapter]

Horatiu Cirstea
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper describes the way the Needham-Schroeder Public-Key protocol is specified in ELAN, the system developed in Nancy to model and compute in the rewriting calculus.  ...  The protocol has been shown to be vulnerable and a correction has been proposed.  ...  We sincerely thank Claude Kirchner for his help in the design of this approach. We thank Pierre-Etienne Moreau for his useful hints and suggestions concerning the implementation in ELAN.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45241-9_10">doi:10.1007/3-540-45241-9_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mvqfjsdbtrarzpxmdrcwy2n6du">fatcat:mvqfjsdbtrarzpxmdrcwy2n6du</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401105648/http://www.loria.fr/~cirstea/Papers/padl2001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/b1/8cb1a7debbf5456080fc63b39be9d48702efda82.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45241-9_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Approaches to Formal Verification of Security Protocols [article]

Suvansh Lal, Mohit Jain, Vikrant Chaplot
<span title="2011-01-10">2011</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We follow the notion of - same goal through different approaches - as we formally analyze the Needham Schroeder Public Key protocol for Lowe's attack using each of our presented approaches.  ...  Thus, formal verification of security protocols has become a key issue in computer and communications security.  ...  Section III, introduces the Needham Schroeder Public Key protocol (NSPK) and the classical Lowe's attack on it.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1101.1815v1">arXiv:1101.1815v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3maqpqmqlvdjdgzsinpzsxpcnu">fatcat:3maqpqmqlvdjdgzsinpzsxpcnu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200827152011/https://arxiv.org/ftp/arxiv/papers/1101/1101.1815.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/11/3411ff1265fd9d2afe909a8e8f86131e5b0d5e32.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1101.1815v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Generic Verification of Security Protocols [chapter]

Abdul Sahid Khan, Madhavan Mukund, S. P. Suresh
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
One approach to the automatic verification of security protocols with a bounded set of agents uses logic programming with analysis and synthesis rules to describe how the attacker gains information and  ...  We also describe a simplification of the Dolev-Yao attacker model that suffices to analyze secrecy properties.  ...  It is based on a protocol designed by Needham and Schroeder [NS78] and is aimed at allowing two agents A and B to exchange two independent, secret numbers.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11537328_18">doi:10.1007/11537328_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/utcxgriw2jddvinwy3y7xbfx4a">fatcat:utcxgriw2jddvinwy3y7xbfx4a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161008090342/http://spinroot.com/spin/Workshops/ws05/025_paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/7f/4c7f5423a203b2597707b7e5ec6d88cb10da07c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11537328_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Rule-based Programming in Java For Protocol Verification

Horatiu Cirstea, Pierre-Etienne Moreau, Antoine Reilles
<span title="">2005</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uy5mv2ncw5eahkdx47hkrglxmm" style="color: black;">Electronical Notes in Theoretical Computer Science</a> </i> &nbsp;
We illustrate our method by specifying in TOM the Needham-Schroeder public-key protocol that aims to establish a mutual authentication between an initiator and a responder that communicate via an insecure  ...  This paper presents an approach for the development of model-checkers in a framework, called TOM, merging declarative and imperative features.  ...  In this paper we analyze the Needham-Schroeder public-key protocol using an approach where rewrite rules are combined with an imperative style of programming leading to a clear and flexible specification  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.06.022">doi:10.1016/j.entcs.2004.06.022</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/epiuboerbzbijktua4ffxt2ff4">fatcat:epiuboerbzbijktua4ffxt2ff4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190228111810/https://core.ac.uk/download/pdf/82329476.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/d9/1fd9c6c84dfceb3ef2b940ea18fd94b7d475086f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.entcs.2004.06.022"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Formal Analysis of Combinations of Secure Protocols [chapter]

Elliott Blot, Jannik Dreier, Pascal Lafourcade
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
When trying to prove the security of a protocol, one usually analyzes the protocol in isolation, i.e., in a network with no other protocols.  ...  But in reality, there will be many protocols operating on the same network, maybe even sharing data including keys, and an intruder may use messages of one protocol to break another.  ...  NS = Needham Schroeder [24], NSS = Needham Schroeder Symmetric Key [24], NSSA = Needham Schroeder Symmetric Key Amended [25], NSL = Needham Schroeder Lowe [19], AS = SPLICE/AS [29], AShc = Hwang and Chen's  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-75650-9_4">doi:10.1007/978-3-319-75650-9_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pqw3acuvnralrbiyzhpn2bpv6a">fatcat:pqw3acuvnralrbiyzhpn2bpv6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180726041818/https://hal.archives-ouvertes.fr/hal-01558552/file/article.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/44/bb444b35844ad5dde158e93df5f6d004a64b6c1a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-75650-9_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cryptographic Protocols [chapter]

<span title="2015-10-09">2015</span> <i title="John Wiley &amp; Sons, Inc."> Applied Cryptography, Second Edition </i> &nbsp;
The goals are to provide a simple formal notation for describing security protocols, to formalize the assumptions of the Dolev-Yao model using this notation, and to analyze the complexity of the secrecy  ...  We formalize the Dolev-Yao model of security protocols, using a notation based on multiset rewriting with existentials.  ...  administered by the Office of Naval Research under Grant N00014-01-1-0795.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781119183471.part1">doi:10.1002/9781119183471.part1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dxhl25g44jc3jjkvyrjptglmsq">fatcat:dxhl25g44jc3jjkvyrjptglmsq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100818121217/http://www-cs-students.stanford.edu/~nad/papers/msr-jcs215.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/95/8895dc075abe47ac9b62145e87c2a688fcdc21a5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781119183471.part1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions [article]

Jaouhar Fattahi, Mohamed Mejri, Emil Pricop
<span title="2019-03-01">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions.  ...  We show how it helps to teach about a security vulnerability in a given step of this protocol where the value of security of a particular sensitive ticket in a sent message unexpectedly plummets compared  ...  FORMAL ANALYSIS OF THE NEEDHAM-SCHROEDER SYMMETRIC-KEY PROTOCOL In this section, we analyze the Needham-Schroeder symmetric-key protocol with Theorem 1 (LTWF) for secrecy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.00499v1">arXiv:1903.00499v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nfedqvdctfcdjmo5f6wj32luqi">fatcat:nfedqvdctfcdjmo5f6wj32luqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200901150843/https://arxiv.org/pdf/1903.00499v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/de/23/de23494ad8e249da674000825644af84ecc91b22.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.00499v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

Amol H. Shinde, Umbarkar A.J., Pillai N.R.
<span title="2017-06-01">2017</span> <i title="ICT Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uxetzvijnjcd3bstva3cpdbqoi" style="color: black;">ICTACT Journal on Communication Technology</a> </i> &nbsp;
These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security.  ...  Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods.  ...  In [24] , as a case study Brutus has been used to analyze Needham-Schroeder public key protocol, 1KP and Wide Mouthed Frog protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21917/ijct.2017.0226">doi:10.21917/ijct.2017.0226</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cjtshuv25rbvjggalyzy7xtdkq">fatcat:cjtshuv25rbvjggalyzy7xtdkq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180612135244/http://ictactjournals.in/paper/IJCT_Vol_8_Iss_2_Paper_7_1533_1539.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a6/12/a61279d6f7f18c49696820610c734db3371c0abb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21917/ijct.2017.0226"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A General Approach to the Verification of Cryptographic Protocols Using Answer Set Programming [chapter]

James P. Delgrande, Torsten Grote, Aaron Hunter
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In our approach, cryptographic protocols are represented as extended logic programs where the answer sets correspond to traces of protocol runs.  ...  This work is also part of a larger project in which we are exploring the advantages of explicit, declarative representations of protocol verification problems.  ...  Currently, we have encoded two protocols: the Needham Schroeder Protocol and the Challenge Response Protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04238-6_30">doi:10.1007/978-3-642-04238-6_30</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vedmr2lnt5aexexmfaq24ayvvi">fatcat:vedmr2lnt5aexexmfaq24ayvvi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706113545/http://www.cs.sfu.ca/~jim/publications/LPNMR09.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/a7/eda78677646fa4dfce6862a13fa5da3da3ddf404.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-04238-6_30"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Verifying security protocols with Brutus

E. M. Clarke, S. Jha, W. Marrero
<span title="2000-10-01">2000</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7dwkv5m7lfbbpi6he2w2suk6b4" style="color: black;">ACM Transactions on Software Engineering and Methodology</a> </i> &nbsp;
If a software architect wants to deploy some of these protocols in a system, they have to be sure that the protocol has the right properties as dictated by the requirements of the system.  ...  Due to the rapid growth of the "Internet" and the "World Wide Web" security has become a very important concern in the design and implementation of software systems.  ...  We will first look at the Needham-Schroeder Public Key authentication protocol [Needham and Schroeder 1978] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/363516.363528">doi:10.1145/363516.363528</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qjw2v37mnrch7nu2uumb7ek734">fatcat:qjw2v37mnrch7nu2uumb7ek734</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100623052234/http://www.aladdin.cs.cmu.edu/papers/pdfs/y2000/brutus.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/50/9e/509e60bc9d1d01ec10934f1c9b0faf80a33c3088.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/363516.363528"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Experimenting with STA, a tool for automatic analysis of security protocols

Michele Boreale, Maria Grazia Buscemi
<span title="">2002</span> <i title="ACM Press"> Proceedings of the 2002 ACM symposium on Applied computing - SAC &#39;02 </i> &nbsp;
We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol.  ...  We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols.  ...  EXAMPLE" NEEDHAM-SCHROEDER We consider here two versions of the asymmetric Needham-Schroeder protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/508832.508847">doi:10.1145/508832.508847</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ttsfsxx7tbdhdc3qk6vlmzfqhi">fatcat:ttsfsxx7tbdhdc3qk6vlmzfqhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921224707/http://rap.dsi.unifi.it/~boreale/papers/SAC02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/8c/a08c5156a66a0fd1ca0e99436ed355c68df6eb33.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/508832.508847"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Experimenting with STA, a tool for automatic analysis of security protocols

Michele Boreale, Maria Grazia Buscemi
<span title="">2002</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uo6yx5jpgnf2zl7mkrumytd4ti" style="color: black;">Proceedings of the 2002 ACM symposium on Applied computing - SAC &#39;02</a> </i> &nbsp;
We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol.  ...  We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols.  ...  EXAMPLE" NEEDHAM-SCHROEDER We consider here two versions of the asymmetric Needham-Schroeder protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/508791.508847">doi:10.1145/508791.508847</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sac/BorealeB02.html">dblp:conf/sac/BorealeB02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bzfr3kohgfecfg6xzzf36lbqlm">fatcat:bzfr3kohgfecfg6xzzf36lbqlm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921224707/http://rap.dsi.unifi.it/~boreale/papers/SAC02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/8c/a08c5156a66a0fd1ca0e99436ed355c68df6eb33.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/508791.508847"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Theorem for Secrecy in Tagged Protocols Using the Theory of Witness-Functions [article]

Jaouhar Fattahi
<span title="2018-03-21">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we enunciate the theorem of secrecy in tagged protocols using the theory of witness-functions and we run a formal analysis on a new tagged version of the Needham-Schroeder public-key protocol  ...  We discuss the significance of tagging in securing cryptographic protocols as well.  ...  FORMAL ANALYSIS OF A TAGGED VERSION OF THE NEEDHAM-SCHROEDER PUBLIC-KEY PROTOCOL In this section, we propose our new tagged version of the Needham-Schroeder public-key protocol (different from the NSL  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.08151v1">arXiv:1803.08151v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lllfq4rn45bq5fvi7wt6v5jroa">fatcat:lllfq4rn45bq5fvi7wt6v5jroa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929172634/https://arxiv.org/pdf/1803.08151v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/b0/b4b0143bc463ecc7da8401aba2d979a6b23e2bd8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.08151v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The Logic of Authentication Protocols [chapter]

Paul Syverson, Iliano Cervesato
<span title="">2001</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Lowe's attack operates on the following fragment of a protocol due to Needham and Schroeder [NS78] , the public-key version of the Needham-Schroeder Shared-Key Protocol 1 analyzed in Section 2.3.  ...  First, here is a picture of a bundle for Protocol 7, the (abridged) Needham-Schroeder Public-Key Protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45608-2_2">doi:10.1007/3-540-45608-2_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bfi5h47qlfgtvodgjfgv7jyiai">fatcat:bfi5h47qlfgtvodgjfgv7jyiai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504075308/https://link.springer.com/content/pdf/10.1007%2F3-540-45608-2_2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/d2/b8d26acc39a606d6af222047a652d807f1e28bea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45608-2_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 333 results