Names in Cryptographic Protocols
Simone Lupetti, Feike W. Dillema, Tage Stabell-Kulø
2006
Abstract
This paper discusses the security properties of names. To fulfill their role in cryptographic protocols, names must be unique across correlated sessions i.e. where the massages of one session can be reused in another without detection and that uniqueness must be guaranteed to hold for each participant of these runs. To provide and verify uniqueness, two different mechanisms are shown possible, namely local and global verification. In both cases we discuss the implications of uniqueness on the execution environment of a cryptographic protocol, pointing out the inescapable issues related to each of the two mechanisms. We argue that such implications should be given careful consideration as they represent important elements in the evaluation of a cryptographic protocol itself.
DownloadPaper Citation
in Harvard Style
Lupetti S., W. Dillema F. and Stabell-Kulø T. (2006). Names in Cryptographic Protocols . In Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006) ISBN 978-972-8865-52-8, pages 185-194. DOI: 10.5220/0002484701850194
in Bibtex Style
@conference{wosis06,
author={Simone Lupetti and Feike W. Dillema and Tage Stabell-Kulø},
title={Names in Cryptographic Protocols},
booktitle={Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)},
year={2006},
pages={185-194},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002484701850194},
isbn={978-972-8865-52-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 4th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2006)
TI - Names in Cryptographic Protocols
SN - 978-972-8865-52-8
AU - Lupetti S.
AU - W. Dillema F.
AU - Stabell-Kulø T.
PY - 2006
SP - 185
EP - 194
DO - 10.5220/0002484701850194