Needham-Schroeder Public Key Protocol

GPTKB entity

Statements (58)
Predicate Object
gptkbp:instanceOf television channel
gptkbp:addresses key distribution problem
gptkbp:basedOn asymmetric encryption
gptkbp:claims public key infrastructure
gptkbp:composedOf two main phases
gptkbp:designedBy gptkb:Michael_Schroeder
gptkb:Roger_Needham
gptkbp:firstAwarded client requests session key
server sends session key
gptkbp:has several variants
influenced later protocols
https://www.w3.org/2000/01/rdf-schema#label Needham-Schroeder Public Key Protocol
gptkbp:introduced 1978
gptkbp:involves key exchange
gptkbp:is widely studied
used in secure messaging
an example of a secure online communication protocol
an academic benchmark
an early example of public key protocols
an example of a challenge-response protocol
an example of a digital signature protocol
an example of a key agreement protocol
an example of a nonce-based protocol
an example of a public key authentication protocol
an example of a secure application protocol
an example of a secure authentication protocol
an example of a secure channel protocol
an example of a secure communication framework
an example of a secure communication protocol
an example of a secure data exchange protocol
an example of a secure email protocol
an example of a secure file transfer protocol
an example of a secure key exchange protocol
an example of a secure network protocol
an example of a secure remote access protocol
an example of a secure service protocol
an example of a secure system protocol
an example of a secure transaction protocol
an example of a secure web protocol
an example of a session key establishment protocol
an example of a three-party protocol
an example of a two-party protocol
an important contribution to computer security
foundational in cryptography
an example of a cryptographic key management protocol
an example of a cryptographic authentication protocol
an example of a challenge-response authentication protocol
an example of a secure identity verification protocol
gptkbp:operates various security protocols
gptkbp:provides authentication
gptkbp:purpose secure communication
gptkbp:relatedTo gptkb:Kerberos
Diffie-Hellman key exchange
gptkbp:requires trusted third party
gptkbp:skills man-in-the-middle attack
gptkbp:uses public key cryptography
symmetric encryption for session key
gptkbp:utilizes nonces