Title
PEO Revised
Authors
A. Futoransky and E. Kargieman
In
DISC 98 (Diá Intrenacional de la Seguridad en Cómputo). DF, Mexico.
Date published
1998-10-01
Keywords
secure logging, cryptographic protocol, log integrity

Abstract

This paper focus on the security analysis of the cryptographic protocols PEO and VCR rst introduced in [1] and with important applications in information security and auditing1. The analysis is oriented to prove the security of the protocols based only on general properties of cryptographic hash functions and independently of the functions used for the
implementation. Towards this goal a modification to the original protocols is proposed that would strengthen the security.

Attachments

PEO.pdf - Article