Prudent engineering practice for cryptographic protocols

被引:206
作者
Abadi, M [1 ]
Needham, R [1 ]
机构
[1] UNIV CAMBRIDGE,COMP LAB,CAMBRIDGE CB2 3QG,ENGLAND
关键词
cryptography; authentication; cryptographic protocols; authentication protocols; security;
D O I
10.1109/32.481513
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors. Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.
引用
收藏
页码:6 / 15
页数:10
相关论文
共 37 条
[1]   A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS [J].
ABADI, M ;
BURROWS, M ;
LAMPSON, B ;
PLOTKIN, G .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04) :706-734
[2]  
[Anonymous], ACM OPER SYST REV
[3]  
BELLOVIN SM, 1990, ACM COMPUTER COMMUNI, V20, P119
[4]  
BOYD C, 1993, P ADV CRYPTOLOGY EUR, P240
[5]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[6]   TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS [J].
DENNING, DE ;
SACCO, GM .
COMMUNICATIONS OF THE ACM, 1981, 24 (08) :533-536
[7]  
FEIGE U, 1987, 19TH P ANN ACM S THE, P210
[8]  
HEINTZE N, 1992, CMUCS92100 TECHN REP
[9]  
HICKMAN KEB, 1995, E COMMUNICATION JUN
[10]  
Kipp E.B., 1994, SSL PROTOCOL