Creating Trust and Replacing Public Key Encryption: The Needham Schroeder Protocol

--

What’s one of the most difficult things to do in cybersecurity? Ans: Key management and in the creation of a trust infrastructure. Well, one method we can use was defined in 1978 by Roger Needham and Michael Schroeder [1]:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.