Abstract
Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back. This “ping-pong” action continues several times, using sequences of operators as specified by the protocol. The set of operators may include public-key encryptions and decryptions.
We present an O(n3) algorithm which determines the security of a given protocol (of length n). This is an improvement of the algorithm of Dolev and Yao [DY].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Infor. Th., Vol. IT-22, No. 6, November 1976, pp. 644–654.
R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Vol. 21, February 1978, pp. 120–126.
R. M. Needham and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers,” Comm. ACM, Vol. 21, No. 12, December 1978, pp. 993–999.
D. Dolev and A. C. Yao, “On the Security of Public Key Protocols,” to appear, IEEE Trans. on IT.
B. K. Rosen, “Tree-Manipulating Systems and Church Rosser Theorems,” JACM, Vol. 20, No. 1, January 1973, pp. 160–187.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1983 Springer Science+Business Media New York
About this paper
Cite this paper
Dolev, D., Even, S., Karp, R.M. (1983). On the Security of Ping-Pong Protocols. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_16
Download citation
DOI: https://doi.org/10.1007/978-1-4757-0602-4_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0604-8
Online ISBN: 978-1-4757-0602-4
eBook Packages: Springer Book Archive