Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Roger M. Needham is active.

Publication


Featured researches published by Roger M. Needham.


Communications of The ACM | 1978

Using encryption for authentication in large networks of computers

Roger M. Needham; Michael D. Schroeder

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.


ACM Transactions on Computer Systems | 1990

A logic of authentication

Michael Burrows; Martín Abadi; Roger M. Needham

Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication. We have been able to explain a variety of authentication protocols formally, to discover subtleties and errors in them, and to suggest improvements. In this paper we present the logic and then give the results of our analysis of four published protocols, chosen either because of their practical importance or because they serve to illustrate our method.


IEEE Journal on Selected Areas in Communications | 1991

Autonet: a high-speed, self-configuring local area network using point-to-point links

Michael D. Schroeder; Andrew Birrell; Michael Burrows; Hal Murray; Roger M. Needham; Thomas L. Rodeheffer; Edwin H. Satterthwaite; Charles P. Thacker

A sizing gage for use with an LVDT probe for producing an output signal representing the deviation of part dimension from a nominally ideal dimension, and a columnar display means comprising vertically arranged light emitting diodes for indicating the degree and sense; i.e., oversize or undersize, of part size deviation according to which of the emitting diodes is lighted. The probe output is an ac signal of polarity representing the degree of deviation. The probe output signal is converted to a dc voltage the amplitude and polarity of which is representative of part size deviation. The dc signal is used as a comparison base against a precision triangle wave signal to generate a squarewave the transitions of which occur at points in time related to the amplitude and polarity of the dc signal. This squarewave is compared to a reference squarewave of fixed transition time to produce a window pulse the width of which is representative of the degree of part size deviation. The window pulse gates clock pulses from a precision oscillator to a pair of decade counters to address a diode excitation matrix. The tens signal is gated to either the oversize light bank or the undersize light bank according to whether the time variable signal leads or lags the fixed time signal. Nulling and range setting circuit details are disclosed.


ieee symposium on security and privacy | 1994

Prudent engineering practice for cryptographic protocols

Martín Abadi; Roger M. Needham

We present principles for the design of cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have avoided a considerable number of published errors. Our principles are informal guidelines. They complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.


Communications of The ACM | 1982

Grapevine: an exercise in distributed computing

Andrew Birrell; Roy Levin; Michael D. Schroeder; Roger M. Needham

Grapevine is a multicomputer system on the Xerox research internet. It provides facilities for the delivery of digital messages such as computer mail; for naming people, machines, and services; for authenticating people and machines; and for locating services on the internet. This paper has two goals: to describe the system itself and to serve as a case study of a real application of distributed computing. Part I describes the set of services provided by Grapevine and how its data and function are divided among computers on the internet. Part II presents in more detail selected aspects of Grapevine that illustrate novel facilities or implementation techniques, or that provide insight into the structure of a distributed system. Part III summarizes the current state of the system and the lesson learned from it so far.


IEEE Journal on Selected Areas in Communications | 1993

Protecting poorly chosen secrets from guessing attacks

Li Gong; T. Mark A. Lomas; Roger M. Needham; Jerome H. Saltzer

In a security system that allows people to choose their own passwords, people tend to choose passwords that can be easily guessed. This weakness exists in practically all widely used systems. Instead of forcing users to choose secrets that are likely to be difficult for them to remember, solutions that maintain user convenience and a high level of security at the same time are proposed. The basic idea is to ensure that data available to the attacker is sufficiently unpredictable to prevent an offline verification of whether a guess is successful or not. Common forms of guessing attacks are examined, examples of cryptographic protocols that are immune to such attacks are developed, and a systematic way to examine protocols to detect vulnerabilities to such attacks is suggested. >


international cryptology conference | 1995

Robustness Principles for Public Key Protocols

Ross J. Anderson; Roger M. Needham

We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help attackers spot errors which can be exploited.


ACM Transactions on Computer Systems | 1984

Experience with Grapevine: the growth of a distributed system

Michael D. Schroeder; Andrew Birrell; Roger M. Needham

Grapevine is a distributed, replicated system that provides message delivery, naming, authentication, resource location, and access control services in an internet of computers. The system, described in a previous paper [1], was designed and implemented several years ago. We now have had operational experience with the system under substantial load. This experience has proved the original design sound in most aspects, but there also have been some surprises. In this paper we report what we have learned from using Grapevine. Our experience may offer some help to designers of new systems. Grapevine is implemented as a program that is run on a set of dedicated server computers. Client programs o f Grapevine run on various workstation and server computers attached to an internet. The services provided by Grapevine are divided into the message service and the registration service. The message service accepts messages prepared by clients for delivery to individual recipients and distribution lists. Messages are buffered in inboxes on message servers until the recipient requests them. Any message server can accept any message for delivery, thus providing a replicated submission service. A computer system mall user has inboxes on at least two message servers, thus replicating the delivery path for the user.


Operating Systems Review | 1998

A new family of authentication protocols

Ross J. Anderson; Francesco Bergadano; Bruno Crispo; Jong-Hyeon Lee; Charalampos Manifavas; Roger M. Needham

We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous constructions. Previously, one-time digital signatures based on hash functions involved hundreds of hash function computations for each signature; we show that given online access to a timestamping service, we can sign messages using only two computations of a hash function. Previously, techniques to sign infinite streams involved one such one-time signature for each message block; we show that in many realistic scenarios a small number of hash function computations is sufficient. Previously, the Diffie Hellman protocol enabled two principals to create a confidentiality key from scratch: we provide an equivalent protocol for integrity, which enables two people who do not share a secret to set up a securely serialised channel into which attackers cannot subsequently intrude. In addition to being of potential use in real applications, our constructions also raise interesting questions about the definition of a digital signature, and the relationship between integrity and authenticity.


Computer Science Today | 1995

Programming Satan's computer

Ross J. Anderson; Roger M. Needham

Cryptographic protocols are used in distributed systems to identify users and authenticate transactions. They may involve the exchange of about 2–5 messages, and one might think that a program of this size would be fairly easy to get right. However, this is absolutely not the case: bugs are routinely found in well known protocols, and years after they were first published. The problem is the presence of a hostile opponent, who can alter messages at will. In effect, our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. This is a fascinating problem; and we hope that the lessons learned from programming Satans computer may be helpful in tackling the more common problem of programming Murphys.

Collaboration


Dive into the Roger M. Needham's collaboration.

Top Co-Authors

Avatar

Bruce Christianson

University of Hertfordshire

View shared research outputs
Top Co-Authors

Avatar

B. Landy

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge