Skip to main content

Needham–Schroeder Protocols

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 563 Accesses

In 1978, Needham and Schroeder [2] proposed symmetric and public key based protocols for key establishment (more specifically, key transport) (see symmetric cryptosystem, public key cryptography, or [1]). Their protocols satisfy a number of properties, including mutual identification of the participants, key authentication, and the establishment of a shared key. Of historical importance, the Needham–Schroeder symmetric key protocol forms the basis for the Kerberos authentication protocol [1].

The symmetric key based version (see symmetric cryptosystem) employs a trusted server T (see Trusted Third Party) that is online, or active during the key establishment. In this protocol, user A wishes to establish a key with user B, and initiates a protocol with T for this purpose. Both A and B (as well as any other user that will interact with T) respectively share symmetric keys KA and KB with T. At a high level, this protocol involves A securely interacting with T to establish a shared key K,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Menezes, A., P. van Oorschot, and S. Vanstone (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.

    MATH  Google Scholar 

  2. Needham, R.M. and M.D. Schroeder (1978). “Using encryption for authentication in large networks of computers.” Communications of the ACM, 21, 993–999.

    Article  MATH  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Just, M. (2005). Needham–Schroeder Protocols. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_270

Download citation

Publish with us

Policies and ethics