METHODICAL USE OF CRYPTOGRAPHIC TRANSFORMATIONS IN AUTHENTICATION PROTOCOLS

Authors
Citation
W. Mao et C. Boyd, METHODICAL USE OF CRYPTOGRAPHIC TRANSFORMATIONS IN AUTHENTICATION PROTOCOLS, IEE proceedings. Computers and digital techniques, 142(4), 1995, pp. 272-278
Citations number
23
Categorie Soggetti
Computer Sciences","Computer Science Hardware & Architecture","Computer Science Theory & Methods
ISSN journal
13502387
Volume
142
Issue
4
Year of publication
1995
Pages
272 - 278
Database
ISI
SICI code
1350-2387(1995)142:4<272:MUOCTI>2.0.ZU;2-X
Abstract
Design of cryptographic protocols for authentication and key managemen t is known to be a difficult problem. Although much research has been devoted to analysis techniques there remains a lack of basic design pr inciples. In the paper a common method of protocol design is identifie d which contributes to protocol problems in a number of ways. This is the practice of encrypting all relevant fields using a reversible cryp tographic transformation. A new design principle and a complementary n otation are introduced which help protocol designers to identify what form of encryption is really required. Several examples are used to il lustrate the problems and to show how the design principle and notatio n may be used in practice.