From Wikipedia, the free encyclopedia
The two protocols are:
- The Needham-Schroeder Symmetric Key Protocol is based on a symmetric encryption algorithm. It forms the basis for the Kerberos protocol. This protocol aims to establish a session key between two parties on a network to protect their communication.
- The Needham-Schroeder Public-Key Protocol, based on public-key cryptography. This is intended to provide mutual authentication between two parties communicating on a network, but in its proposed form it is not secure.
Other pages[change | change source]
Other websites[change | change source]
- http://www.lsv.ens-cachan.fr/spore/nspk.html - description of the Public-key protocol
- http://www.lsv.ens-cachan.fr/spore/nssk.html - the Symmetric-key protocol
- http://www.lsv.ens-cachan.fr/spore/nspkLowe.html - the public-key protocol amended by Lowe
References[change | change source]
- Needham, Roger; Schroeder, Michael (December 1978), "Using encryption for authentication in large networks of computers.", Communications of the ACM 21 (12): 993-999,