Authors
Anish Mathuria, R Safani-Naini, Peter Nickolas
Publication date
1994/12
Publisher
University of Wollongong. Department of Computing Science
Description
We reveal instances of unsoundness, incompleteness, and redundancy in the cryptographic protocol analysis logic of Gong, Needham and Yahalom. Solutions are proposed for each of these problems. The logic is extended to formalize the use of an uncerti ed key in the Yahalom protocol, and our analysis of the protocol suggests the possibility of a redundancy in the protocol.
Total citations
19961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021122112112211211
Scholar articles