Name |
Abstract |
Andrew Secure RPC |
Exchanged of a fresh shared key.
Symmetric key cryptography.
|
BAN modified Andrew Secure RPC |
Modified version of Andrew Secure RPC correcting
a freshness flaw.
Exchanged of a fresh shared key,
Symmetric key cryptography.
|
BAN concrete Andrew Secure RPC |
A concrete realization of the Andrew Secure RPC protocol,
stronger and with less encryption.
Exchanged of a fresh shared key,
Symmetric key cryptography.
|
Lowe modified BAN concrete Andrew Secure RPC |
A modified version of the BAN concrete Andrew Secure RPC protocol,
preventing a parallel session attack.
Exchanged of a fresh shared key,
Symmetric key cryptography.
|
Bull's Authentication Protocol |
This protocol, described in [bull97], aims at establishing fresh
session keys between a fixed number of participants (for instance 3) and a server: one
key for each pair of agents adjacent in the chain.
|
CAM |
A protocol used by mobile computers to inform their peers when their
network address has changed.
|
CCITT X.509 (1) |
One message protocol from the recommendations of the CCITT for the CCITT.X.509 standard.
|
CCITT X.509 (1c) |
Correction of the CCITT X.509 (1) one message protocol.
|
CCITT X.509 (3) |
Three messages protocol in the recommendations of the CCITT for the CCITT.X.509 standard.
|
BAN modified version of CCITT X.509 (3) |
Modified version of the three messages protocol
in the recommendations of the CCITT for the CCITT.X.509 standard
(CCITT X.509 (3)).
|
Denning-Sacco shared key |
Modified version of the Needham Schroeder Symmetric Key with
timestamps to fix the freshness flaw.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server and timestamps.
|
Lowe modified Denning-Sacco shared key |
Modified version of the Denning-Sacco shared key protocol
to correct a freshness flaw.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server and timestamps.
|
Diffie Helman |
The Diffie Helman key exchange algorithm.
|
GJM |
The goal of this protocol is to achieve distributed contract signing in an abuse-free way, that is no party ever can prove to a third party that he is able of determining the issue of the exchange (validate or invalidate the contract). To achieve this goal, a special construction called private contract signature is introduced. Such a private contract signature has the particular property that it is meaningful only for a given trusted third party. Moreover, this protocol is optimistic in the sense that the trusted third party is required only in case of problem.
|
Gong |
Mutual authentication protocol of two principals with a trusted
server, and exchange of a new symmetric key.
Uses one-way functions and no encryption.
|
Kao Chow Authentication v.1 |
Key distribution and authentication protocol.
Symmetric keys cryptography with server.
|
Kao Chow Authentication v.2 |
Key distribution and authentication protocol.
Symmetric keys cryptography with server.
|
Kao Chow Authentication v.3 |
Key distribution and authentication protocol.
Symmetric keys cryptography with server.
|
Kerberos V5 |
Distribution of a symmetric key (in a ticket),
for communication between a client and a server,
with authentication.
|
KSL |
Nonce based improvement of Kerberos V5 protocol
with generalized timestamps.
Distribution of a session key and a ticket and
repeated mutual authentication.
Symmetric key cryptography with server.
|
Lowe modified KSL |
Lowe modified version of the KSL protocol
to prevent authentication attacks.
Distribution of a session key and a ticket and
repeated mutual authentication.
Symmetric key cryptography with server.
|
Neumann Stubblebine |
Session key exchange inspired by the Yahalom protocol
with the addition of timestamps, and mutual authentication.
Symmetric key cryptography with server.
|
Hwang modified version of Neumann Stubblebine |
Modified version of the Neumann Stubblebine
protocol, to correct attack of the repeated authentification part.
|
Needham-Schroeder Public Key |
Mutual authentication, using a trusted key server and public keys.
|
Lowe's fixed version of Needham-Schroder Public Key |
This protocol is an amended version of the Needham-Schroeder Public Key.
Its purpose id mutual authentication, using a trusted keyserver and public keys. |
Needham Schroeder Symmetric Key |
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server.
|
Amended Needham Schroeder Symmetric Key |
This is an amended version of Needham Schroeder Symmetric Key, by the same authors.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server.
|
Otway Rees |
Distribution of a shared symmetric key by a trusted server.
Symmetric key cryptography with server.
|
Schnorr's Protocol |
The Schnorr protocol is described by R. Cramer,
I. Damgård and B. Schoenmakers in [BRICS-EP-94-CDS_PPKS].
|
Shamir-Rivest-Adleman Three Pass Protocol |
The following protocol, described in [ClarkJacob97], allows two principals
to exchange a secret message without sharing any initial secret. |
SK3 |
Symmetric key distribution using Smart Cards, by Shoup and Rubin.
|
SmartRight view-only |
This view-only protocol is part of the SmartRight
system designed by Thomson for copy protection
for the Digital Video Broadcasting technology.
Its purpose is to ensure that the digital content
broadcasted can be view only once.
It uses symmetric key cryptography with nonces and xor.
|
SPLICE/AS |
Mutual authentication protocol.
Public key cryptography
with a certification authority
signing and distributing public keys.
|
Hwang and Chen modified SPLICE/AS |
This modified version correct two flaws in SPLICE/AS.
Mutual authentication protocol with
public key cryptography
with a certification authority
signing and distributing public keys.
|
Clark and Jacob modified Hwang and Chen modified SPLICE/AS |
This modified version corrects a flaws in Hwang and Chen modified SPLICE/AS.
Mutual authentication protocol with
public key cryptography
with a certification authority
signing and distributing public keys.
|
TMN |
Distribution of a fresh symmetric key and authentication.
Symmetric keys, trusted server and
public keys (only the public key of the server is used).
|
Wired Equivalent Privacy Protocol |
The Wired Equivalent Privacy (WEP) protocol, described in [802.11], is
used to protect data during wireless transmission.
|
Wide Mouthed Frog |
Distribution of a fresh shared key.
Symmetric key cryptography with server and timestamps.
|
Lowe modified Wide Mouthed Frog |
An modified version of Wide Mouthed Frog.
Exchanged of a fresh shared key.
Symmetric key cryptography with server and timestamps.
|
Woo and Lam Mutual Authentication |
Key distribution and mutual authentication with trusted server and symmetric keys.
|
Woo and Lam Pi |
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 3, Woo and Lam Pi 2,
Woo and Lam Pi 1, and Woo and Lam Pi f.
|
Woo and Lam Pi 1 |
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi f.
|
Woo and Lam Pi 2 |
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 1 and Woo and Lam Pi f.
|
Woo and Lam Pi 3 |
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 2, Woo and Lam Pi 1,
and Woo and Lam Pi f.
|
Woo and Lam Pi f |
One way authentification protocol with
public keys and trusted server.
|
Yahalom |
Distribution of a fresh symmetric shared key by
a trusted server and mutual authentication.
Symmetric keys and trusted server.
|
BAN simplified version of Yahalom |
An amended version of the Yahalom protocol,
presented in the BAN logic paper.
Symmetric keys and trusted server.
|
Lowe's modified version of Yahalom |
Lowe's modified version of the Yahalom protocol.
Symmetric keys and trusted server.
|
Paulson's strengthened version of Yahalom |
Paulson's modified version of the Yahalom protocol.
Symmetric keys and trusted server.
|