Properties (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:analyzes |
cryptographers
|
gptkbp:designedBy |
gptkb:Michael_Schroeder
gptkb:Roger_Needham |
gptkbp:hasVariants |
gptkb:Needham-Schroeder_Public_Key_Protocol
gptkb:Needham-Schroeder_Symmetric_Key_Protocol |
https://www.w3.org/2000/01/rdf-schema#label |
Needham-Schroeder Protocol
|
gptkbp:improves |
gptkb:Needham-Schroeder-Lowe_Protocol
|
gptkbp:involves |
two parties
session keys nonce values |
gptkbp:isBasedOn |
asymmetric encryption
symmetric encryption challenge-response mechanism |
gptkbp:isConsidered |
a basis for further research
a milestone in secure communications foundational in cryptography important in computer science |
gptkbp:isCriticizedFor |
complexity
dependency on timestamps lack of mutual authentication requirement of synchronized clocks vulnerability to replay attacks |
gptkbp:isExaminedBy |
academic papers
cryptography textbooks security protocols literature |
gptkbp:isLocatedIn |
network protocols
software applications security frameworks |
gptkbp:isPartOf |
computer security
|
gptkbp:isRelatedTo |
encryption
authentication network security secure communications |
gptkbp:isUsedBy |
financial institutions
government agencies cloud service providers corporate networks telecommunication companies |
gptkbp:isUsedIn |
gptkb:TLS/SSL
VPNs secure messaging secure file transfer |
gptkbp:operates |
various security systems
|
gptkbp:publishedIn |
gptkb:ACM_Transactions_on_Computer_Systems
|
gptkbp:purpose |
secure communication
|
gptkbp:relatedTo |
gptkb:Kerberos
Diffie-Hellman key exchange |
gptkbp:requires |
trusted third party
|
gptkbp:skills |
man-in-the-middle attack
|
gptkbp:type |
key exchange protocol
|
gptkbp:uses |
symmetric key cryptography
public key cryptography |
gptkbp:yearEstablished |
1978
|