0% found this document useful (0 votes)
29 views1 page

The Needham-Schroeder Rules

The document discusses the Needham-Schroeder rules of conduct for secure network authentication published in 1978. It describes two rules of conduct using private key encryption, with one forming the basis for the Kerberos authentication protocol. The rules of conduct were designed around core principles to provide reliable authentication in a distributed network in a way that is resistant to active attackers.

Uploaded by

Chris Harris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

The Needham-Schroeder Rules

The document discusses the Needham-Schroeder rules of conduct for secure network authentication published in 1978. It describes two rules of conduct using private key encryption, with one forming the basis for the Kerberos authentication protocol. The rules of conduct were designed around core principles to provide reliable authentication in a distributed network in a way that is resistant to active attackers.

Uploaded by

Chris Harris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

The Needham-Schroeder Rules of conduct

Roger Needham and Michael Schroeder of the Xerox Palo Low female singing voice Research Center
published

a paper in December of 1978 describing their (solid basic structure on which bigger things can be built)
for designing a

secure network (verifying someone's identity) system. The paper, entitled "Using (turning messages into
secret code) for

(verifying someone's identity) in Large Networks of Computers," described two different rules of
conduct

that could be put into use to provide a reliable, secure (verifying someone's identity) service for a

distributed network of computers. The first rules of conduct described in the paper uses private

key (turning messages into secret code), and it is this rules of conduct that forms the basis of the
Kerberos network

(verifying someone's identity) rules of conduct.

Needham and Schroeder organized and listed (more than two, but not a lot of) ideas (you think are true)
around which they designed

their rules of conduct. One idea (you think is true), the ability for an evil and cruel attacker to take
(prisoner) by force packets

in-transit on the network, change them, and send packets of his own design, was

described by the authors as an "extreme view," yet now is thought of as a (something commonly done)

needed thing for any secure network rules of conduct. Designing a rules of conduct that is resistant

to these types of attacks is very hard, and I'll point out the clearly stated/particular design decisions

that were made to interfere with the plans of/prevent them as I discuss the rules of conduct.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy