-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy patha01_listings.tex
47 lines (45 loc) · 1.42 KB
/
a01_listings.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
\chapter{Appendix 1: Authentication Protocols in 1992}
\label{appendix:protocol_list}
The following table lists the protocols available in 1993 for performing authentication in a distributed system. The bugs and redundancies information is also based on the knowledge people had at that time. It has been extracted from \citetitle{Liebl1993}\cite{Liebl1993}.
The types column correspond to the encryption type: it can be based on a public key (PK), a secret key (SK) or on a one-way function (OF).
\begin{table}[!ht]
\centering
\caption{Table of Protocols}
\begin{tabular}{| l | l | l | c | c |}
\hline
Protocol & Type & Year & Bugs & Redundancies \\
\hline
Needham-Schroder & PK & 1978 & y & y \\
\hline
Needham-Schroder & SK & 1978 & y & y \\
\hline
Denning-Sacco & SK & 1981 & & \\
\hline
Andrew Secure RPC & SK & 1985 & y & y \\
\hline
Needham-Schroeder & SK & 1987 & & \\
\hline
CCITT X.509 & PK & 1987 & y & y \\
\hline
STS & PK & 1987 & & \\
\hline
Otway-Rees & SK & 1987 & & y \\
\hline
Kerberos V4 & SK & 1988 & & y \\
\hline
Gong & OF & 1989 & & \\
\hline
Lomas et al. & PK/SK & 1989 & & \\
\hline
SPX & PK & 1991 & & \\
\hline
Davis-Swick & SK & 1990 & & \\
\hline
KATHY & PK & 1990 & & \\
\hline
Kehne et al. & SK & 1992 & & \\
\hline
Kerberos V5 & SK & 1992 & & \\
\hline
\end{tabular}
\end{table}