Needham-Schroeder-Lowe Protocol
GPTKB entity
Properties (45)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:application |
secure messaging
secure remote access secure file transfer |
gptkbp:composedOf |
two main phases
|
gptkbp:criticism |
vulnerable to replay attacks
requires a trusted third party |
gptkbp:developedBy |
gptkb:Michael_Schroeder
gptkb:Roger_Needham William_Lowe |
gptkbp:firstAwarded |
client sends a message with the nonce
client sends a request to the server server responds with a nonce server verifies the message |
https://www.w3.org/2000/01/rdf-schema#label |
Needham-Schroeder-Lowe Protocol
|
gptkbp:improves |
Lowe's_modification
|
gptkbp:influencedBy |
gptkb:Needham-Schroeder_Protocol
Lowe's_modification_of_Needham-Schroeder |
gptkbp:introduced |
1978
|
gptkbp:notableFeature |
ensures message integrity with cryptographic checksums
can be adapted for various applications can be used in distributed systems ensures session key secrecy prevents replay attacks with timestamps provides mutual authentication supports key distribution supports multiple clients uses nonces uses timestamps |
gptkbp:operates |
network protocols
secure applications various security systems |
gptkbp:purpose |
secure communication
|
gptkbp:relatedTo |
gptkb:Kerberos
public key infrastructure Diffie-Hellman key exchange |
gptkbp:safetyFeatures |
gptkb:ISO/IEC_9798
RFC 4120 |
gptkbp:security |
confidentiality
authentication integrity session key establishment |
gptkbp:skills |
man-in-the-middle attack
|
gptkbp:uses |
symmetric key cryptography
public key cryptography |