Security Protocols Open Repository
   HOME

TheInfoList



OR:

SPORE, the Security Protocols Open Repository, is an online library of security protocols with comments and links to papers. Each protocol is downloadable in a variety of formats, including rules for use with automatic protocol verification tools. All protocols are described using
BAN logic Ban, or BAN, may refer to: Law * Ban (law), a decree that prohibits something, sometimes a form of censorship, being denied from entering or using the place/item ** Imperial ban (''Reichsacht''), a form of outlawry in the medieval Holy Roman ...
or the style used by Clark and Jacob, and their goals. The database includes details on formal proofs or known attacks, with references to comments, analysis & papers. A large number of protocols are listed, including many which have been shown to be insecure. It is a continuation of the seminal work by
John Clark John Clark may refer to: Entertainment *John Clark or Signor Brocolini (1841–1906), Irish-born American operatic singer and actor * John Clark (actor) (born 1932), English actor and theatre director *John Clark (American actor) (1933–2011), ...
and Jeremy Jacob.A Survey of Authentication Protocol Literature: Version 1.0
, the original 1997 paper by
John Clark John Clark may refer to: Entertainment *John Clark or Signor Brocolini (1841–1906), Irish-born American operatic singer and actor * John Clark (actor) (born 1932), English actor and theatre director *John Clark (American actor) (1933–2011), ...
and Jeremy Jacob They seek contributions for new protocols, links and comments.


See also

*
Cryptographic nonce In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication. It is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused i ...
*
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
* Important
books A book is a medium for recording information in the form of writing or images, typically composed of many pages (made of papyrus, parchment, vellum, or paper) bound together and protected by a cover. The technical term for this physica ...
,
papers Paper is a thin, flat material produced by the compression of fibres. Paper(s) or The Paper may also refer to: Publishing and academia * Newspaper, a periodical publication * ''Paper'' (magazine), an American monthly fashion and culture magazin ...
, and
open problems In science and mathematics, an open problem or an open question is a known problem which can be accurately stated, and which is assumed to have an objective and verifiable solution, but which has not yet been solved (i.e., no solution for it is kno ...
in cryptography. * List of cryptography topics. *
Public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
* Short and long lists of cryptographers. *
Symmetric-key algorithm Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between ...


References


External links


SPORE - Security Protocols Open Repository
Cryptographic protocols Secure communication Computer network security {{comp-sci-stub