Issue No. 01 - January (1996 vol. 22)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.481513
<p><b>Abstract</b>—We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.</p><p>Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," in IEEE Transactions on Software Engineering, vol. 22, no. , pp. 6-15, 1996.