Abstract
Welcome to the 17th Security Protocols Workshop; the theme this year is “Brief Encounters”.
Traditional authentication protocols were designed to be re-run every time you had an interaction with the system. That’s because, as Roger Needham was fond of saying, the original protocols were designed on the assumptions that message payloads were expensive, and state was evil. By this he meant that the cost of maintaining any significant amount of state, for the duration of time between presentations by the client to the system, was prohibitive for systems with any significant amount of throughput. And the option of bundling the state up and moving it across the network to the client in the way that we do with stateless file-servers was out, because the high costs of message payloads wouldn’t allow you to transfer significant amounts of state in that way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Christianson, B. (2013). Introduction: Brief Encounters. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)