gptkbp:instance_of
|
gptkb:protocol
|
gptkbp:applies_to
|
distributed systems
|
gptkbp:based_on
|
gptkb:Needham-Schroeder_protocol
|
gptkbp:designed_by
|
gptkb:Michael_Schroeder
gptkb:Roger_Needham
William Lowe
|
gptkbp:first_introduced
|
gptkb:1987
|
https://www.w3.org/2000/01/rdf-schema#label
|
Needham-Schroeder-Lowe protocol
|
gptkbp:improves
|
gptkb:Needham-Schroeder_protocol
|
gptkbp:involves
|
session keys
|
gptkbp:is_based_on
|
challenge-response mechanism
|
gptkbp:is_criticized_for
|
complexity
key management issues
vulnerability to replay attacks
|
gptkbp:is_implemented_in
|
gptkb:software
network protocols
|
gptkbp:is_notable_for
|
its historical significance
its influence on later protocols
its role in secure communications
its use in academic research
its application in real-world systems
|
gptkbp:is_part_of
|
cryptographic protocols
|
gptkbp:is_related_to
|
authentication mechanisms
secure communication protocols
key exchange protocols
|
gptkbp:is_studied_in
|
gptkb:crypt
gptkb:computer_science
information security
|
gptkbp:is_used_in
|
VPNs
e-commerce
online banking
secure messaging
secure file transfer
|
gptkbp:is_vulnerable_to
|
man-in-the-middle attack
|
gptkbp:provides
|
mutual authentication
|
gptkbp:purpose
|
secure communication
|
gptkbp:related_to
|
gptkb:Kerberos
|
gptkbp:requires
|
trusted third party
|
gptkbp:uses
|
gptkb:crypt
symmetric key cryptography
|
gptkbp:uses_nonces
|
gptkb:true
|
gptkbp:uses_timestamps
|
gptkb:true
|
gptkbp:bfsParent
|
gptkb:Needham-Schroeder_protocol
|
gptkbp:bfsLayer
|
6
|