Title :
Prudent engineering practice for cryptographic protocols
Author :
Abadi, Mahdi ; Needham, R.
Author_Institution :
Syst. Res. Center, Digital Equipment Corp., Palo Alto, CA, USA
Abstract :
We present principles for the design of cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have avoided a considerable number of published errors. Our principles are informal guidelines. They complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.
Keywords :
cryptography; protocols; cryptographic protocols; informal guidelines; prudent engineering practice; Authentication; Cryptographic protocols; Cryptography; Design engineering; Graphics; Guidelines; Laboratories; Logic; Mechanical factors; Protection;
Conference_Titel :
Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-5675-1
DOI :
10.1109/RISP.1994.296587