Needham-Schroeder Protocol

GPTKB entity

Properties (54)
Predicate Object
gptkbp:instanceOf television channel
gptkbp:analyzes cryptographers
gptkbp:designedBy gptkb:Michael_Schroeder
gptkb:Roger_Needham
gptkbp:hasVariants gptkb:Needham-Schroeder_Public_Key_Protocol
gptkb:Needham-Schroeder_Symmetric_Key_Protocol
https://www.w3.org/2000/01/rdf-schema#label Needham-Schroeder Protocol
gptkbp:improves gptkb:Needham-Schroeder-Lowe_Protocol
gptkbp:involves two parties
session keys
nonce values
gptkbp:isBasedOn asymmetric encryption
symmetric encryption
challenge-response mechanism
gptkbp:isConsidered a basis for further research
a milestone in secure communications
foundational in cryptography
important in computer science
gptkbp:isCriticizedFor complexity
dependency on timestamps
lack of mutual authentication
requirement of synchronized clocks
vulnerability to replay attacks
gptkbp:isExaminedBy academic papers
cryptography textbooks
security protocols literature
gptkbp:isLocatedIn network protocols
software applications
security frameworks
gptkbp:isPartOf computer security
gptkbp:isRelatedTo encryption
authentication
network security
secure communications
gptkbp:isUsedBy financial institutions
government agencies
cloud service providers
corporate networks
telecommunication companies
gptkbp:isUsedIn gptkb:TLS/SSL
VPNs
secure messaging
secure file transfer
gptkbp:operates various security systems
gptkbp:publishedIn gptkb:ACM_Transactions_on_Computer_Systems
gptkbp:purpose secure communication
gptkbp:relatedTo gptkb:Kerberos
Diffie-Hellman key exchange
gptkbp:requires trusted third party
gptkbp:skills man-in-the-middle attack
gptkbp:type key exchange protocol
gptkbp:uses symmetric key cryptography
public key cryptography
gptkbp:yearEstablished 1978