Boyd, Colin.

Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria. - Berlin ; New York : Springer, c2003. - xxiv, 321 p. ; 24 cm. - Information security and cryptography .

1. INTRODUCTION TO AUTHENTICATION AND KEY ESTABLISHMENT
Introduction
Cryptographic tools
Adversary capabilities
Goals for authentication and key establishment
etc..

2. COMPUTATIONAL SECURITY MODELS
Bellare-Rogaway model
Canetti-Krawczyk model
eCK Model
etc..

3. PROTOCOL USING SHARED KEY CRYPTOGRPHY
Entity authentication protocols
Server-less key establishment
Sever-based key establishment
etc...

4.AUTHENTICATION AND KEY TRANSPORT USING PUBLIC KEY CRYPTOGRAPHY
Entity authentication protocols
Key transport protocols
Conclusion

5. KEY AGREEMENT PROTOCOLS
Diffie-Hellman key agreement
MTI Protocols
Diffie-Hellman-based protocols with basic message format

6. TRANSPORT LAYER SECURITY PROTOCOL
Internet security protocols
Background on TLS
Protocol structure
etc...

7. IDENTITY-BASED KEY AGREEMENT
Identity-based protocols without pairing
Pairing-based key agreement with basic message format
Pairing-based key agreement with explicit authentication
etc...

8. PASSWORD-BASED PROTOCOLS
Encrypted key exchange using Diffie-Hellman
Two-party PAKE protocols
Two-party argumented PAKE protocol
etc..

9. GROUP KEY ESTABLISHMENT
Generalizing Diffie-Hellman key agreement
Group key agreement protocols
Identity-based group key establishment protocols
etc..


Includes bibliographical references (p. [295]-316) and indexes.

3540431071 (alk. paper) 9783662581452


Computer networks--Security measures.
Computer network protocols.
Data encryption (Computer science)
Public key infrastructure (Computer security)

005.82 / BOY