Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:protocol
|
gptkbp:consists_of |
two main phases
|
gptkbp:developed_by |
gptkb:Roger_Needham
gptkb:M._Schroeder |
gptkbp:has |
security flaws
|
https://www.w3.org/2000/01/rdf-schema#label |
Needham-Schroeder protocol
|
gptkbp:introduced_in |
gptkb:1978
|
gptkbp:involves |
session keys
|
gptkbp:is_adopted_by |
industry standards
|
gptkbp:is_analyzed_in |
vulnerability assessments
cryptographic research |
gptkbp:is_based_on |
challenge-response mechanism
|
gptkbp:is_cited_in |
academic literature
|
gptkbp:is_compared_to |
other authentication protocols
|
gptkbp:is_considered_as |
a benchmark for protocols
a classic protocol foundational work in cryptography |
gptkbp:is_criticized_for |
complexity
lack of scalability |
gptkbp:is_described_as |
academic papers
|
gptkbp:is_discussed_in |
gptkb:textbooks
online forums security conferences |
gptkbp:is_evaluated_by |
gptkb:performance
security properties |
gptkbp:is_explored_in |
research papers
thesis works |
gptkbp:is_implemented_in |
network protocols
software libraries various security systems |
gptkbp:is_influenced_by |
previous authentication methods
|
gptkbp:is_part_of |
network security
cryptographic protocols computer science curriculum information security practices secure software development secure network design |
gptkbp:is_related_to |
gptkb:Kerberos
digital signatures identity verification |
gptkbp:is_subject_to |
formal verification
|
gptkbp:is_supported_by |
gptkb:crypt
encryption techniques |
gptkbp:is_tested_for |
real-world scenarios
attacks |
gptkbp:is_used_by |
various applications
|
gptkbp:is_used_for |
secure transactions
|
gptkbp:is_used_in |
VPNs
secure communications secure messaging e-commerce security |
gptkbp:is_vulnerable_to |
man-in-the-middle attack
|
gptkbp:provides |
mutual authentication
|
gptkbp:requires |
trusted third party
|
gptkbp:successor |
gptkb:Needham-Schroeder-Lowe_protocol
|
gptkbp:suitable_for |
open networks
|
gptkbp:type |
symmetric key protocol
|
gptkbp:uses |
gptkb:crypt
|
gptkbp:bfsParent |
gptkb:Kerberos
|
gptkbp:bfsLayer |
5
|