Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria.
Series: Information security and cryptographyPublication details: Berlin ; New York : Springer, c2003.Description: xxiv, 321 p. ; 24 cmISBN:- 3540431071 (alk. paper)
- 9783662581452
- 005.82 22 BOY
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Closed Access | Engineering Library | 005.82 BOY 1 (Browse shelf(Opens below)) | 1 | Available | BUML24030734 |
1. INTRODUCTION TO AUTHENTICATION AND KEY ESTABLISHMENT
Introduction
Cryptographic tools
Adversary capabilities
Goals for authentication and key establishment
etc..
2. COMPUTATIONAL SECURITY MODELS
Bellare-Rogaway model
Canetti-Krawczyk model
eCK Model
etc..
3. PROTOCOL USING SHARED KEY CRYPTOGRPHY
Entity authentication protocols
Server-less key establishment
Sever-based key establishment
etc...
4.AUTHENTICATION AND KEY TRANSPORT USING PUBLIC KEY CRYPTOGRAPHY
Entity authentication protocols
Key transport protocols
Conclusion
5. KEY AGREEMENT PROTOCOLS
Diffie-Hellman key agreement
MTI Protocols
Diffie-Hellman-based protocols with basic message format
6. TRANSPORT LAYER SECURITY PROTOCOL
Internet security protocols
Background on TLS
Protocol structure
etc...
7. IDENTITY-BASED KEY AGREEMENT
Identity-based protocols without pairing
Pairing-based key agreement with basic message format
Pairing-based key agreement with explicit authentication
etc...
8. PASSWORD-BASED PROTOCOLS
Encrypted key exchange using Diffie-Hellman
Two-party PAKE protocols
Two-party argumented PAKE protocol
etc..
9. GROUP KEY ESTABLISHMENT
Generalizing Diffie-Hellman key agreement
Group key agreement protocols
Identity-based group key establishment protocols
etc..
Includes bibliographical references (p. [295]-316) and indexes.
There are no comments on this title.