Protocols for Authentication and Key Establishment
Springer Berlin (Verlag)
978-3-540-43107-7 (ISBN)
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
1 A Tutorial Introduction to Authentication and Key Establishment.- 2 Goals for Authentication and Key Establishment.- 3 Protocols Using Shared Key Cryptography.- 4 Authentication and Key Transport Using Public Key Cryptography.- 5 Key Agreement Protocols.- 6 Conference Key Protocols.- 7 Password-Based Protocols.- A Standards for Authentication and Key Establishment.- A.1 ISO Standards.- A.1.1 ISO/IEC 9798.- A.1.2 ISO/IEC 11770.- A.1.3 ISO 9594-8/ITU X.509.- A.2 Other Standards.- A.2.1 IETF Standards.- A.2.2 IEEE P1363-2000.- A.2.3 NIST and ANSI Standards.- B Summary of Notation.- References.- Index of Protocols.- General Index.
From the reviews:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types ... . will prove useful both to those who wish to learn more about the field and as a reference ... ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)
Erscheint lt. Verlag | 8.8.2003 |
---|---|
Reihe/Serie | Information Security and Cryptography |
Zusatzinfo | XXIV, 321 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 628 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Algorithm analysis and problem complexity • authentication • Communication • cryptography • Key Management • Kryptographie / Kryptologie • Notation • protocols • security • Standards |
ISBN-10 | 3-540-43107-1 / 3540431071 |
ISBN-13 | 978-3-540-43107-7 / 9783540431077 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich