Abstract
This chapter gives some examples of cryptographic protocols that are interesting and important from practical, theoretical, historical and didactical points of view. It also presents the problem of the correctness and security of such protocols. It is now known that several important cryptographic protocols, which were still in use not so long ago, had some significant faults. It is worth analyzing them in order to understand how surprising, at the first glance, attacks can be and how obvious they become after the analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ANSI X9.95. Trusted Time Stamp Management and Security, USA (2009). https://www.x9.org/news/pr050701
Barker, E.: Recommendation for Digital Signature Timeliness. NIST Special Publication 800-102, National Institute of Standards and Technology, USA (2009)
Basin, D., Wolff, B.: Theorem Proving in Higher Order Logics. LNCS, vol. 2758. Springer, Berlin (2003)
Bella, G., Longo, C., Paulson, L.C.: In: Basin, D., Wolff, B. (eds.) Theorem Proving in Higher Order Logics. LNCS, vol. 2758, pp. 352–366 (2003)
Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE J. Sel. Areas Commun. 21(1), 77–87 (2003)
Bellare, M., Garay, J., Hauser, R., Herberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP—a family of secure electronic payment protocols. In: Proceedings of the 1st USENIX Workshop on Electronic Commerce (1995)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)
Clarke, E., Marrero, W., Jha, S.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: IFIP Working Conference on Programming Concepts and Methods (PROCOMET) (1996)
Electronic Signatures and Infrastructures (ESI); Policy requirements for time-stamping authorities. ETSI TS 102 023 v1.2.2, European Telecommunications Standards Institute, Technical Specification (2008)
Internet key exchange protocol. In: RFC 2408 (1998)
Kurkowski, M.: Deduction methods of verification of correctness of authentication protocols. Ph.D. Thesis. ICS PAS, Warsaw, Poland (2003)
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proceedings of TACAS, pp. 147–166 (1996)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001). Fifth printing with Errata: http://www.cacr.math.uwaterloo.ca/hac/errata/errata.html
Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)
Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur. 2(3), 332–351 (1999)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)
Recommendation x.509: The directory—authentication framework. In: ITU-T (1997)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (2004)
Set secure electronic transaction LLC. In: The SET Standard Specification (1997)
What is digital timestamping. RSA Laboratories (2012). http://www.rsa.com/rsalabs/node.asp?id=2347
Woo, T., Lam, S.: A lesson on authentication protocol design. In: Operating Systems Review, pp. 24–37 (1994)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kościelny, C., Kurkowski, M., Srebrny, M. (2013). Cryptographic Protocols. In: Modern Cryptography Primer. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41386-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-41386-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41385-8
Online ISBN: 978-3-642-41386-5
eBook Packages: Computer ScienceComputer Science (R0)