scispace - formally typeset
Search or ask a question
Topic

Otway–Rees protocol

About: Otway–Rees protocol is a research topic. Over the lifetime, 1975 publications have been published within this topic receiving 40569 citations.


Papers
More filters
Journal ArticleDOI
Greg O'Shea1, Michael Roe1
01 Apr 2001
TL;DR: This work presents a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives, intended to enable experimentation with (mobile) IPv6 before the transition to a comprehensive IPSEC infrastructure.
Abstract: We present a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives. A mobile node uses a partial hash of its public key for its IPv6 address. Our protocol integrates distribution of public keys and protects against falsification of network addresses. Our protocol is easy to implement, economic to deploy and lightweight in use. It is intended to enable experimentation with (mobile) IPv6 before the transition to a comprehensive IPSEC infrastructure.

185 citations

Journal ArticleDOI
TL;DR: A protocol for use at the host-host level of computer networks is presented and assertions which reflect important characteristics of the protocol are derived and verified, for a demonstration that cyclic sequence numbers could be used in the protocol without ambiguity.

184 citations

Proceedings Article
J Yang, Jaemin Park, H Lee, K Ren, Kwangjo Kim 
01 Jul 2005
TL;DR: I am grateful to Prof. Adi Shamir of the Weizmann Institute in Israel for his precious comments and kind advice on the authors' protocol during his visit to ICU during Asiacryt2004.
Abstract: I am grateful to Prof. Adi Shamir of the Weizmann Institute in Israel for his precious comments and kind advice on our protocol during his visit to ICU during Asiacryt2004.

183 citations

Book ChapterDOI
Ray Bird1, Inder Sarat Gopal1, Amir Herzberg1, Philippe Janson1, Shay Kutten1, Refik Molva1, Moti Yung1 
11 Aug 1991
TL;DR: A new authenticated exchange protocol is presented which is both provably secure and highly efficient and practical, and prevents chosen plaintext or ciphertext attacks on the cryptosystem.
Abstract: We investigate protocols for authenticated exchange of messages between two parties in a communication network. Secure authenticated exchange is essential for network security. It is not difficult to design simple and seemingly correct solutions for it, however, many such 'solutions' can be broken. We give some examples of such protocols and we show a useful methodology which can be used to break many protocols. In particular, we break a protocol that is being standardized by the ISO.We present a new authenticated exchange protocol which is both provably secure and highly efficient and practical. The security of the protocol is proven, based on an assumption about the the cryptosystem employed (namely, that it is secure when used in CBC mode on a certain message space). We think that this assumption is quite reasonable for many cryptosystems, and furthermore it is often assumed in practical use of the DES cryptosystem. Our protocol cannot be broken using the methodology we present (which was strong enough to catch all protocol flaws we found). The reduction to the security of the encryption mode, indeed captures the non-existence of the exposures that the methodology catches (specialized to the actual use of encryption in our protocol). Furthermore, the protocol prevents chosen plaintext or ciphertext attacks on the cryptosystem.The proposed protocol is efficient and practical in several aspects. First, it uses only conventional cryptography (like the DES, or any privately-shared one-way function) and no public-key. Second, the protocol does not require synchronized clocks or counter management. Third, only a small number of encryption operations is needed (we use no decryption), all with a single shared key. In addition, only three messages are exchanged during the protocol, and the size of these messages is minimal. These properties are similar to existing and proposed actual protocols. This is essential for integration of the proposed protocol into existing systems and embedding it in existing communication protocols.

180 citations

Journal ArticleDOI
TL;DR: A new protocol, named HB-MP, derived from HB^+, is presented, providing a more efficient performance and resistance to the active attacks applied to the HB-family.

178 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
86% related
Encryption
98.3K papers, 1.4M citations
86% related
Wireless ad hoc network
49K papers, 1.1M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20239
202236
20211
20194
201812
201795