Needham-Schroeder-Lowe protocol

GPTKB entity

Statements (44)
Predicate Object
gptkbp:instance_of gptkb:protocol
gptkbp:applies_to distributed systems
gptkbp:based_on gptkb:Needham-Schroeder_protocol
gptkbp:designed_by gptkb:Michael_Schroeder
gptkb:Roger_Needham
William Lowe
gptkbp:first_introduced gptkb:1987
https://www.w3.org/2000/01/rdf-schema#label Needham-Schroeder-Lowe protocol
gptkbp:improves gptkb:Needham-Schroeder_protocol
gptkbp:involves session keys
gptkbp:is_based_on challenge-response mechanism
gptkbp:is_criticized_for complexity
key management issues
vulnerability to replay attacks
gptkbp:is_implemented_in gptkb:software
network protocols
gptkbp:is_notable_for its historical significance
its influence on later protocols
its role in secure communications
its use in academic research
its application in real-world systems
gptkbp:is_part_of cryptographic protocols
gptkbp:is_related_to authentication mechanisms
secure communication protocols
key exchange protocols
gptkbp:is_studied_in gptkb:crypt
gptkb:computer_science
information security
gptkbp:is_used_in VPNs
e-commerce
online banking
secure messaging
secure file transfer
gptkbp:is_vulnerable_to man-in-the-middle attack
gptkbp:provides mutual authentication
gptkbp:purpose secure communication
gptkbp:related_to gptkb:Kerberos
gptkbp:requires trusted third party
gptkbp:uses gptkb:crypt
symmetric key cryptography
gptkbp:uses_nonces gptkb:true
gptkbp:uses_timestamps gptkb:true
gptkbp:bfsParent gptkb:Needham-Schroeder_protocol
gptkbp:bfsLayer 6