This paper focus on the security analysis of the cryptographic protocols PEO and VCR rst introduced in [1] and with important applications in information security and auditing1. The analysis is oriented to prove the security of the protocols based only on general properties of cryptographic hash functions and independently of the functions used for the implementation. Towards this goal a modification to the original protocols is proposed that would strengthen the security.
Related information
Projects
CORE WISDOM
Tools
Core Wisdom | Msyslog
Tuesday, September 1, 1998