The Needham-Schroeder Rules
The Needham-Schroeder Rules
Roger Needham and Michael Schroeder of the Xerox Palo Low female singing voice Research Center
published
a paper in December of 1978 describing their (solid basic structure on which bigger things can be built)
for designing a
secure network (verifying someone's identity) system. The paper, entitled "Using (turning messages into
secret code) for
(verifying someone's identity) in Large Networks of Computers," described two different rules of
conduct
that could be put into use to provide a reliable, secure (verifying someone's identity) service for a
distributed network of computers. The first rules of conduct described in the paper uses private
key (turning messages into secret code), and it is this rules of conduct that forms the basis of the
Kerberos network
Needham and Schroeder organized and listed (more than two, but not a lot of) ideas (you think are true)
around which they designed
their rules of conduct. One idea (you think is true), the ability for an evil and cruel attacker to take
(prisoner) by force packets
in-transit on the network, change them, and send packets of his own design, was
described by the authors as an "extreme view," yet now is thought of as a (something commonly done)
needed thing for any secure network rules of conduct. Designing a rules of conduct that is resistant
to these types of attacks is very hard, and I'll point out the clearly stated/particular design decisions
that were made to interfere with the plans of/prevent them as I discuss the rules of conduct.