Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR.
Gavin LowePublished in: Softw. Concepts Tools (1996)
Keyphrases
- public key
- authentication protocol
- session key
- security model
- security analysis
- provably secure
- diffie hellman
- blind signature
- homomorphic encryption
- digital signature
- public key cryptosystem
- secure communication
- signature scheme
- image authentication
- secret key
- public key cryptography
- elliptic curve cryptography
- cryptographic protocols
- message authentication codes
- authentication scheme
- encryption scheme
- trusted third party
- rfid tags
- high security
- security properties
- low cost
- blind signature scheme
- lightweight
- key exchange
- user authentication
- public key infrastructure
- ciphertext
- privacy preserving