Modern Cryptography - Theory and Practice: Phần 2
Số trang: 368
Loại file: pdf
Dung lượng: 17.86 MB
Lượt xem: 29
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Part 1 of the is serial Tài liệu Pc Underground to part 2 of you will continue to learn about relevant issues such as: authentication protocols — principles, authentication protocols — the real world, authentication framework for public-key cryptography, formal and strong security definitions for public-key cryptosystems,... Document serve you specialized information technology and related industries.
Nội dung trích xuất từ tài liệu:
Modern Cryptography - Theory and Practice: Phần 2 Chapter 11. Authentication Protocols — Principles • Section Table 11.1.of Contents Introduction Modern Cryptography: Theory and Practice Section 11.2. Authentication and Refined Notions ByWenbo Mao Hewlett-Packard Company Section 11.3. Convention Publisher: Prentice Hall PTR Section Pub 11.4. Date: July Basic 25, 2003 Authentication Techniques ISBN: 0-13-066943-1 Section 11.5. Password-based Authentication Pages: 648 Section 11.6. Authenticated Key Exchange Based on Asymmetric Cryptography Section 11.7. Typical Attacks on Authentication Protocols ManySection 11.8. Aschemes cryptographic Brief Literature Note especially those based on public-keycryptography, and protocols, have basic or so-called textbook crypto versions, as these versionsare usually the subjects for manySection 11.9. textbooks Chapter Summary on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It Exercises explains why textbook crypto isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of textbook crypto for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal- world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography. 11.1 Introduction InChapter 2 we have exposed ourselves to a number of authentication protocols. Most protocols there are fictional ones (with two exceptions): we have deliberately designed them to be flawed in several ways in order for them to serve as an introduction to a culture of caution and vigilance • Table in the areas of of Contents and information security. cryptography Modern Cryptography: Theory and Practice In this chapter ByWenbo we return to Mao Hewlett-Packard the topic of authentication. The purpose of returning to the topic is Company for us to have a more comprehensive study of the area. Our study in this chapter will be divided into two categories: Publisher: Prentice Hall PTR An Pub Date: July 25, 2003 Introduction to Various Authentication Techniques ISBN: 0-13-066943-1 In this648 Pages: category we shall study various basic techniques for authentication. These include the very basic mechanisms and protocol constructions for message and entity authentication, password-based authentication techniques and some important authenticated key establishment techniques. We believe that a number of basic authentication mechanisms and protocol constructions in several international standards are the ones which have been selected from the literature and subsequently gone through a Many cryptographic schemes and protocols, especially those based on public-keycryptography, careful (and long) process of expert review and improvement revision. Therefore, in our have basic or so-called textbook crypto versions, as these versionsare usually the subjects for introduction to the basic authentication techniques, we shall pay particular attention to the many textbooks on cryptography. This book takes adifferent approach to introducing mechanisms which have been standardized by international standard bodies. In addition, cryptography: it pays much more attention tofit-for-application aspects of cryptography. It we shall introduce a few other reputable authentication and authenticated key explains why textbook crypto isonly good in an ideal world where data are random and bad establishment protocols. We believe that authentication mechanisms and protocols guys behave nicely.It reveals the general unfitness of textbook crypto for the real world by introduced in this category have a value for serving as building blocks and guidelines for demonstratingnumerous attacks on such schemes, protocols and systems under variousreal- designing good protocols. We therefore consider that this category provides the model world application scenarios. This book chooses to introduce a set of practicalcryptographic authentication techniques for protocol designers. schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong An Exemplified Study of a Wide Range of Protocol Flaws (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book This also is anincludes self-containedtheoretical inevitable background material part in the subject of authentication. that We shall listisvarious the foundation for known and modern cryptography. typical attacking techniques which can be mounted on authentication protocols. We shall analy ...
Nội dung trích xuất từ tài liệu:
Modern Cryptography - Theory and Practice: Phần 2 Chapter 11. Authentication Protocols — Principles • Section Table 11.1.of Contents Introduction Modern Cryptography: Theory and Practice Section 11.2. Authentication and Refined Notions ByWenbo Mao Hewlett-Packard Company Section 11.3. Convention Publisher: Prentice Hall PTR Section Pub 11.4. Date: July Basic 25, 2003 Authentication Techniques ISBN: 0-13-066943-1 Section 11.5. Password-based Authentication Pages: 648 Section 11.6. Authenticated Key Exchange Based on Asymmetric Cryptography Section 11.7. Typical Attacks on Authentication Protocols ManySection 11.8. Aschemes cryptographic Brief Literature Note especially those based on public-keycryptography, and protocols, have basic or so-called textbook crypto versions, as these versionsare usually the subjects for manySection 11.9. textbooks Chapter Summary on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It Exercises explains why textbook crypto isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of textbook crypto for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal- world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography. 11.1 Introduction InChapter 2 we have exposed ourselves to a number of authentication protocols. Most protocols there are fictional ones (with two exceptions): we have deliberately designed them to be flawed in several ways in order for them to serve as an introduction to a culture of caution and vigilance • Table in the areas of of Contents and information security. cryptography Modern Cryptography: Theory and Practice In this chapter ByWenbo we return to Mao Hewlett-Packard the topic of authentication. The purpose of returning to the topic is Company for us to have a more comprehensive study of the area. Our study in this chapter will be divided into two categories: Publisher: Prentice Hall PTR An Pub Date: July 25, 2003 Introduction to Various Authentication Techniques ISBN: 0-13-066943-1 In this648 Pages: category we shall study various basic techniques for authentication. These include the very basic mechanisms and protocol constructions for message and entity authentication, password-based authentication techniques and some important authenticated key establishment techniques. We believe that a number of basic authentication mechanisms and protocol constructions in several international standards are the ones which have been selected from the literature and subsequently gone through a Many cryptographic schemes and protocols, especially those based on public-keycryptography, careful (and long) process of expert review and improvement revision. Therefore, in our have basic or so-called textbook crypto versions, as these versionsare usually the subjects for introduction to the basic authentication techniques, we shall pay particular attention to the many textbooks on cryptography. This book takes adifferent approach to introducing mechanisms which have been standardized by international standard bodies. In addition, cryptography: it pays much more attention tofit-for-application aspects of cryptography. It we shall introduce a few other reputable authentication and authenticated key explains why textbook crypto isonly good in an ideal world where data are random and bad establishment protocols. We believe that authentication mechanisms and protocols guys behave nicely.It reveals the general unfitness of textbook crypto for the real world by introduced in this category have a value for serving as building blocks and guidelines for demonstratingnumerous attacks on such schemes, protocols and systems under variousreal- designing good protocols. We therefore consider that this category provides the model world application scenarios. This book chooses to introduce a set of practicalcryptographic authentication techniques for protocol designers. schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong An Exemplified Study of a Wide Range of Protocol Flaws (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book This also is anincludes self-containedtheoretical inevitable background material part in the subject of authentication. that We shall listisvarious the foundation for known and modern cryptography. typical attacking techniques which can be mounted on authentication protocols. We shall analy ...
Tìm kiếm theo từ khóa liên quan:
Modern Cryptography Authentication protocols The real world Public-key cryptography Strong security definitiGợi ý tài liệu liên quan:
-
Lecture Data security and encryption - Chapter 9: Public-key cryptography and RSA
69 trang 41 0 0 -
Methods of public-key cryptography
26 trang 37 0 0 -
Lecture Data security and encryption - Chapter 16: RSA
57 trang 32 0 0 -
Advanced Computer Networks: Lecture 40 - Dr. Amir Qayyum
31 trang 29 0 0 -
Creating platform for Creative performers
1 trang 28 0 0 -
Public-Key Cryptography and Key Management
39 trang 26 0 0 -
Ebook Information security: Principles and practice - Mark Stamp
413 trang 24 0 0 -
Modern Cryptography - Theory and Practice: Phần 1
387 trang 24 0 0 -
introduction to modern cryptography: part 2
294 trang 23 0 0 -
Ebook Network security essentials: Applications and standards – Part 1
319 trang 21 0 0