Computational Security Models
During the early years of open academic research in cryptography it was commonplace to see research papers following a sequence of break, fix, break, fix … : a scheme would be proposed and then others would analyse it, often finding an attack. The scheme was then patched up and subjected to further scrutiny, and so the cycle would continue. Although this pattern applied to many different kinds of cryptographic schemes, it was nowhere more true than for protocols for authentication and key exchange.
Unable to display preview. Download preview PDF.