Source: | Amended_Needham_Schroeder_Shared_Key.RoSpi |
Description: | TTP based key-exchange with shared key |
Analyses: | validation, tag inference |
Validation rules: | syntactic analysis |
Resources: | - M.D. Schroeder R.M. Needham. Using encryption for authentication
in large networks of computers. ACM Communication, 21(12):993–999,
1978. - C. Boyd. Hidden assumptions in cryptographic protocols. IEE Proceedings, Part E, pages 433–436, November 1990. - D. Denning and G. Sacco. Timestamps in key distributed protocols. Communication of the ACM, 24(8):533–535, 1981. - R. M. Needham and M. D. Schroeder. Authentication revisited. ACM SIGOPS Operating Systems Review, 21(1):7–7, 1987. - R. Focardi e M. Maffei. rho-spi calculus at work: Authentication Case Studies. To appear in Proceedings of Mefisto Project, ENTCS, Elsevier Sciences, Elsevier, 2004 (FM04.pdf). |