Protocols for authentication and key establishment /
Boyd, Colin.
Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria. - Berlin ; New York : Springer, c2003. - xxiv, 321 p. ; 24 cm. - Information security and cryptography .
1. INTRODUCTION TO AUTHENTICATION AND KEY ESTABLISHMENT
Introduction
Cryptographic tools
Adversary capabilities
Goals for authentication and key establishment
etc..
2. COMPUTATIONAL SECURITY MODELS
Bellare-Rogaway model
Canetti-Krawczyk model
eCK Model
etc..
3. PROTOCOL USING SHARED KEY CRYPTOGRPHY
Entity authentication protocols
Server-less key establishment
Sever-based key establishment
etc...
4.AUTHENTICATION AND KEY TRANSPORT USING PUBLIC KEY CRYPTOGRAPHY
Entity authentication protocols
Key transport protocols
Conclusion
5. KEY AGREEMENT PROTOCOLS
Diffie-Hellman key agreement
MTI Protocols
Diffie-Hellman-based protocols with basic message format
6. TRANSPORT LAYER SECURITY PROTOCOL
Internet security protocols
Background on TLS
Protocol structure
etc...
7. IDENTITY-BASED KEY AGREEMENT
Identity-based protocols without pairing
Pairing-based key agreement with basic message format
Pairing-based key agreement with explicit authentication
etc...
8. PASSWORD-BASED PROTOCOLS
Encrypted key exchange using Diffie-Hellman
Two-party PAKE protocols
Two-party argumented PAKE protocol
etc..
9. GROUP KEY ESTABLISHMENT
Generalizing Diffie-Hellman key agreement
Group key agreement protocols
Identity-based group key establishment protocols
etc..
Includes bibliographical references (p. [295]-316) and indexes.
3540431071 (alk. paper) 9783662581452
Computer networks--Security measures.
Computer network protocols.
Data encryption (Computer science)
Public key infrastructure (Computer security)
005.82 / BOY
Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria. - Berlin ; New York : Springer, c2003. - xxiv, 321 p. ; 24 cm. - Information security and cryptography .
1. INTRODUCTION TO AUTHENTICATION AND KEY ESTABLISHMENT
Introduction
Cryptographic tools
Adversary capabilities
Goals for authentication and key establishment
etc..
2. COMPUTATIONAL SECURITY MODELS
Bellare-Rogaway model
Canetti-Krawczyk model
eCK Model
etc..
3. PROTOCOL USING SHARED KEY CRYPTOGRPHY
Entity authentication protocols
Server-less key establishment
Sever-based key establishment
etc...
4.AUTHENTICATION AND KEY TRANSPORT USING PUBLIC KEY CRYPTOGRAPHY
Entity authentication protocols
Key transport protocols
Conclusion
5. KEY AGREEMENT PROTOCOLS
Diffie-Hellman key agreement
MTI Protocols
Diffie-Hellman-based protocols with basic message format
6. TRANSPORT LAYER SECURITY PROTOCOL
Internet security protocols
Background on TLS
Protocol structure
etc...
7. IDENTITY-BASED KEY AGREEMENT
Identity-based protocols without pairing
Pairing-based key agreement with basic message format
Pairing-based key agreement with explicit authentication
etc...
8. PASSWORD-BASED PROTOCOLS
Encrypted key exchange using Diffie-Hellman
Two-party PAKE protocols
Two-party argumented PAKE protocol
etc..
9. GROUP KEY ESTABLISHMENT
Generalizing Diffie-Hellman key agreement
Group key agreement protocols
Identity-based group key establishment protocols
etc..
Includes bibliographical references (p. [295]-316) and indexes.
3540431071 (alk. paper) 9783662581452
Computer networks--Security measures.
Computer network protocols.
Data encryption (Computer science)
Public key infrastructure (Computer security)
005.82 / BOY