Abstract
Any attack on a protocol is only valid if it violates some property that the protocol was intended to achieve. In other words all attacks must be considered relative to the protocol goals. Experience has proven that many protocol problems result when designers are unclear about the protocol goals they are trying to achieve. This in turn leads to disputes about whether protocol attacks are valid, since designers may regard the goals differently from analysers. Gollmann [118] has recognised that it is a difficult matter to decide exactly what is meant by commonly used words such as ‘authentication’; even though everyone has a general idea of the meaning of such a word, the actual interpretation may vary with the protocol. It turns out that although most authors can agree on general definitions, their ideas diverge when precision is required.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Boyd, C., Mathuria, A. (2003). Goals for Authentication and Key Establishment. In: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-09527-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-662-09527-0_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07716-6
Online ISBN: 978-3-662-09527-0
eBook Packages: Springer Book Archive