Common use of Perfect Forward/Backward Secrecy Clause in Contracts

Perfect Forward/Backward Secrecy. If an adversary π’œ obtains the session key in a session, he will not have access to other session keys in other session because session keys are computed independently, including random nonces (π‘₯ and 𝑦) and temporary 𝑇𝐼𝐷𝑖 and 𝑇𝐼𝐷𝑗 that change in each authentication session. Therefore, the proposed protocol preserves perfect forward backward secrecy.

Appears in 1 contract

Sources: Research Article

Perfect Forward/Backward Secrecy. If an adversary π’œ obtains the session key in a session, he will not have access to other session keys in other session because session keys are computed independently, including random nonces (οΏ½( οΏ½ and 𝑦) and temporary 𝑇𝐼𝐷𝑖 and 𝑇𝐼𝐷𝑗 that change in each authentication session. Therefore, the proposed protocol preserves perfect forward backward secrecy.

Appears in 1 contract

Sources: Research Article