Needham-Schroeder Public Key Protocol
GPTKB entity
Statements (58)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:addresses |
key distribution problem
|
gptkbp:basedOn |
asymmetric encryption
|
gptkbp:claims |
public key infrastructure
|
gptkbp:composedOf |
two main phases
|
gptkbp:designedBy |
gptkb:Michael_Schroeder
gptkb:Roger_Needham |
gptkbp:firstAwarded |
client requests session key
server sends session key |
gptkbp:has |
several variants
influenced later protocols |
https://www.w3.org/2000/01/rdf-schema#label |
Needham-Schroeder Public Key Protocol
|
gptkbp:introduced |
1978
|
gptkbp:involves |
key exchange
|
gptkbp:is |
widely studied
used in secure messaging an example of a secure online communication protocol an academic benchmark an early example of public key protocols an example of a challenge-response protocol an example of a digital signature protocol an example of a key agreement protocol an example of a nonce-based protocol an example of a public key authentication protocol an example of a secure application protocol an example of a secure authentication protocol an example of a secure channel protocol an example of a secure communication framework an example of a secure communication protocol an example of a secure data exchange protocol an example of a secure email protocol an example of a secure file transfer protocol an example of a secure key exchange protocol an example of a secure network protocol an example of a secure remote access protocol an example of a secure service protocol an example of a secure system protocol an example of a secure transaction protocol an example of a secure web protocol an example of a session key establishment protocol an example of a three-party protocol an example of a two-party protocol an important contribution to computer security foundational in cryptography an example of a cryptographic key management protocol an example of a cryptographic authentication protocol an example of a challenge-response authentication protocol an example of a secure identity verification protocol |
gptkbp:operates |
various security protocols
|
gptkbp:provides |
authentication
|
gptkbp:purpose |
secure communication
|
gptkbp:relatedTo |
gptkb:Kerberos
Diffie-Hellman key exchange |
gptkbp:requires |
trusted third party
|
gptkbp:skills |
man-in-the-middle attack
|
gptkbp:uses |
public key cryptography
symmetric encryption for session key |
gptkbp:utilizes |
nonces
|