Flaws are introduced at eve y stage of the protocol development cycle. The engineer is faced with the problem of how t o avoid them. The first step is to gain an understanding of the diflerent flavours of cryptographic protocol flaws, ie. get to know the enemy. This paper provides a classification of protocol flaws, including two new paws in an application of the mental poker protocol, and discusses appropriate countermeasures f o r relevant paw-categories.
Beller, Chang and Yacobi [2] have recently proposed a set of secret key and public key protocols to meet authentication and privacy requirements for conversation set-up protocols for the initiating party of portable communication systems. This paper improves upon the protocols to obtain a higher assurance of authentication and key distribution. Conversation set-up protocols for the responding party are discussed, a public key protocol providing end-to-end authentication and privacy is described, and relative as well as collective merits of the protocols are emphasised.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.