- PEO Revised
- A. Futoransky and E. Kargieman
- DISC 98 (Diá Intrenacional de la Seguridad en Cómputo). DF, Mexico.
- Date published
- secure logging, cryptographic protocol, log integrity
This paper focus on the security analysis of the cryptographic protocols PEO and VCR rst introduced in  and with important applications in information security and auditing1. The analysis is oriented to prove the security of the protocols based only on general properties of cryptographic hash functions and independently of the functions used for the
implementation. Towards this goal a modification to the original protocols is proposed that would strengthen the security.