Abstract:The goal of the paper is to present a set of design principles for avoiding replay attacks in cryptographic protocols. The principles are easily applied to real protocols and they do not consume exces...The goal of the paper is to present a set of design principles for avoiding replay attacks in cryptographic protocols. The principles are easily applied to real protocols and they do not consume excessive computing power or communications bandwidth. In particular we describe how to type-tag messages with unique cryptographic functions, how to inexpensively implement the full information principle with hashes, and how to produce unique session keys without assuming mutual trust between the principals. The techniques do not guarantee security of protocols, but they are concrete ways for improving the robustness of the protocol design with relatively low cost.Read More
Publication Year: 2002
Publication Date: 2002-11-22
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 83
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot