Prools for authentication and key establishment are the foundation for security of communications. The range and diversity of these prools is immense, while the properties and vulnerabilities of different prools can be remarkably subtle.
Here is a comprehensive and integrated treatment of prools for authentication and key establishment. It allows researchers and practitioners to quickly access a prool for their needs and become aware of existing prools that have been broken in the literature.
As well as a clear and uniform presentation of the prools, this book includes a description of all the main attack types and classifies most prools in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
About the Author
Table of Contents
Introduction to Authentication and Key Establishment.- Computational Models.- Protocols Using Shared Key Cryptography.- Authentication and Key Transport Using Public Key Cryptography.- Key Agreement Protocols.- Transport Layer Security Protocol.- Identity-Based Key Agreement.- Password-Based Protocols.- Group Key Establishment.- App. A, Standards for Authentication and Key Establishment.- App. B, Tutorial: Building a Key Establishment Protocol.- App. C, Summary of Notation.