The changing environment for security protocols

被引:5
作者
Needham, RM
机构
[1] Department of Computer Systems, Cambridge University
[2] ACM, Royal Academy of Engineering, Royal Society
来源
IEEE NETWORK | 1997年 / 11卷 / 03期
关键词
D O I
10.1109/65.587044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The systematic study of security protocols started, as far as the public literature is concerned, almost 20 years ago. A paper by M. D. Schroeder and the present writer [1] may be taken as a specimen; it was written in 1977 and published in 1978. it was, of course, written against the background of the technology of the time and made various assumptions about the organizational context in which its techniques would be used. The substantial research literature that has since appeared has, by and large, made similar assumptions about the technological and organizational environments. Those environments have in Fact changed very considerably, and the purpose of the present note is to consider whether the changes should affect our approach to security problems. it turns out that where confidentiality is concerned, as distinct from authenticity and integrity, there is indeed a new range of options.
引用
收藏
页码:12 / 15
页数:4
相关论文
共 1 条
[1]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999