Talk:Needham–Schroeder protocol
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
What about this "other Needham-Schroeder protocol"
[edit]Look at sec. 10.2 http://www.daimi.au.dk/~ivan/dSik/dSikw4.pdf, material for a course on security on Aarhus University, Denmark, written by Ivan Damgård. It describes another protocol suggested by Needham and Schroeder, which assumes that both users have a public key for the other, does not involve a server and is indeed insecure. And aparently the two concepts were both developed in 1978. How do these relate?
Velle 13:53, 27 August 2006 (UTC)
- Good point. There are two different protocols suggested in the same paper. I've written them both up here - arguably the entry could be split in two, if you can be bothered with the resulting disambiguation page.
- --IanHarvey 12:13, 8 September 2006 (UTC)
"Needham-Schroeder Symmetric Key Protocol, also known as the Needham-Schroeder Symmetric Key
Protocol," That sentence seems a bit redundant. I would assume the "x" is also known as "x". :)
Fixing the attack seems to be imprecise for the symmetric protocol
[edit]I read the paper in the ref[1], and after what I understood, it seems that the explanation in the paper and in the wikipedia article are not the same. Something like this seems to be more correct to me: The inclusion of this new nonce prevents the replaying of a compromised version of , because the nonce is maintained by B, and accept it at most once before .
Could someone look into this?
- I think you are right. You can change the description. Alexei Kopylov (talk) 09:22, 9 October 2015 (UTC)
Asymmetric protocol complexity
[edit]Seems to me that any available public-key scheme can be used for both signing and encryption, thus the asymmetric protocol is unnecessarily complex.
smurfix (talk) 13:25, 28 March 2018 (UTC)
- ^ Needham, R. M.; Schroeder, M. D. (1987). "Authentication revisited". ACM SIGOPS Operating Systems Review. 21 (1): 7. doi:10.1145/24592.24593.
- Start-Class Cryptography articles
- Mid-importance Cryptography articles
- Start-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- Start-Class Computing articles
- Mid-importance Computing articles
- All Computing articles