Amended Needham-Schroeder

Source: Amended_Needham_Schroeder_Shared_Key.RoSpi
Description: TTP based key-exchange with shared key
Analyses: validation, tag inference
Validation rules: syntactic analysis
Resources: - M.D. Schroeder R.M. Needham. Using encryption for authentication in large networks of computers. ACM Communication, 21(12):993–999, 1978.
- C. Boyd. Hidden assumptions in cryptographic protocols. IEE Proceedings, Part E, pages 433–436, November 1990.
- D. Denning and G. Sacco. Timestamps in key distributed protocols. Communication of the ACM, 24(8):533–535, 1981.
- R. M. Needham and M. D. Schroeder. Authentication revisited. ACM SIGOPS Operating Systems Review, 21(1):7–7, 1987.
- R. Focardi e M. Maffei. rho-spi calculus at work: Authentication Case Studies. To appear in Proceedings of Mefisto Project, ENTCS, Elsevier Sciences, Elsevier, 2004 (FM04.pdf).