翻訳と辞書
Words near each other
・ Needwood Forest
・ Needy
・ Needy Guims
・ Needy, Oregon
・ Neef
・ Neef Buck
・ Neef House
・ Neefia
・ Neefioides
・ Neehar Raina
・ Neehausen
・ NEEI
・ Needham, Massachusetts
・ Needham, Norfolk
・ Needhamiella
Needham–Schroeder protocol
・ Needhi
・ Needhi Pizhaithathu
・ Needhikku Thalaivanangu
・ Needhikkuppin Paasam
・ Needhiyin Nizhal
・ Needilup, Western Australia
・ Needin' U
・ Needing You (song)
・ Needing You...
・ Needing/Getting
・ Needingworth
・ Needle
・ Needle & Thread
・ Needle (2010 film)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Needham–Schroeder protocol : ウィキペディア英語版
Needham–Schroeder protocol
The term Needham–Schroeder protocol can refer to one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.〔
〕 These are:
* The ''Needham–Schroeder Symmetric Key Protocol'' is based on a symmetric encryption algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish a session key between two parties on a network, typically to protect further communication.
* The ''Needham–Schroeder Public-Key Protocol'', based on public-key cryptography. This protocol is intended to provide mutual authentication between two parties communicating on a network, but in its proposed form is insecure.
==The symmetric protocol==
Here, Alice (A) initiates the communication to Bob (B). S is a server trusted by both parties. In the communication:
* A and B are identities of Alice and Bob respectively
* KAS is a symmetric key known only to A and S
* KBS is a symmetric key known only to B and S
* NA and NB are nonces generated by A and B respectively
* KAB is a symmetric, generated key, which will be the session key of the session between A and B
The protocol can be specified as follows in security protocol notation:
A \rightarrow S: \left . A,B,N_A \right .
:Alice sends a message to the server identifying herself and Bob, telling the server she wants to communicate with Bob.
S \rightarrow A: \, A\}__} and sends back to Alice a copy encrypted under , A\}__} to show that he has the key.
A \rightarrow B: \_{K_{AB}}
:Alice performs a simple operation on the nonce, re-encrypts it and sends it back verifying that she is still alive and that she holds the key.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Needham–Schroeder protocol」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.