Protocols for Authentication and Key Establishment / Edition 1

Protocols for Authentication and Key Establishment / Edition 1

ISBN-10:
3540431071
ISBN-13:
9783540431077
Pub. Date:
09/17/2003
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3540431071
ISBN-13:
9783540431077
Pub. Date:
09/17/2003
Publisher:
Springer Berlin Heidelberg
Protocols for Authentication and Key Establishment / Edition 1

Protocols for Authentication and Key Establishment / Edition 1

Hardcover

$109.99 Current price is , Original price is $109.99. You
$109.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book is the most comprehensive and integrated treatment of the prools required for authentication and key establishment. In a clear, uniform presentation the authors classify most prools in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate prools for particular applications.

In this edition the authors introduced new chapters and updated the text throughout in response to new developments and updated standards. The first chapter, an introduction to authentication and key establishment, provides the necessary background on cryptography, attack scenarios, and prool goals. A new chapter, computational security models, describes computational models for key exchange and authentication and will help readers understand what a computational proof provides and how to compare the different computational models in use. In the subsequent chapters the authors explain prools that use shared key cryptography, authentication and key transport using public key cryptography, key agreement prools, the Transport Layer Security prool, identity-based key agreement, password-based prools, and group key establishment.

The book is a suitable graduate-level introduction, and a reference and overview for researchers and practitioners with 225 concrete prools described. In the appendices the authors list and summarize the relevant standards, linking them to the main book text when appropriate, and they offer a short tutorial on how to build a key establishment prool. The book also includes a list of prools, a list of attacks, a summary of the notation used in the book, general and prool indexes, and an extensive bibliography.


Product Details

ISBN-13: 9783540431077
Publisher: Springer Berlin Heidelberg
Publication date: 09/17/2003
Series: Information Security and Cryptography
Edition description: 2003
Pages: 321
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

About the Author

Colin Boyd is a professor in the Department of Information Security and Communication Technology at the Norwegian University of Science and Technology (NTNU) in Trondheim; he previously held faculty positions at Queensland University of Technology (QUT) and the University of Manchester. Anish Mathuria is a professor at the Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) in Gandhinagar. Douglas Stebila is an associate professor in the Department of Combinatorics & Optimization at the University of Waterloo.

Table of Contents

Introduction to Authentication and Key Establishment.- Computational Security Models.- Prools Using Shared Key Cryptography.- Authentication and Key Transport Using Public Key Cryptography.- Key Agreement Prools.- Transport Layer Security Prool.- Identity-Based Key Agreement.- Password-Based Prools.- Group Key Establishment.- App. A, Standards for Authentication and Key Establishment.- App. B, Tutorial: Building a Key Establishment Prool.- App. C, Summary of Notation.

From the B&N Reads Blog

Customer Reviews