null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
56030
Crypto U9, Cryptographic Protocols
Description
IYM002 (Unit 9 - cryptographic protocols) Mind Map on Crypto U9, Cryptographic Protocols, created by jjanesko on 24/04/2013.
No tags specified
iym002
unit 9 - cryptographic protocols
iym002
unit 9 - cryptographic protocols
Mind Map by
jjanesko
, updated more than 1 year ago
More
Less
Created by
jjanesko
over 11 years ago
132
10
0
Resource summary
Crypto U9, Cryptographic Protocols
specification of all events needed in order to achieve a requried security goal
specifies 4 things
protocol assumptions
protocol flow
communication steps in protocol
protocol messages
kind of content in messages
protocol actions
any action an entity needs to perform before sending or after receiving a message
stages of protocol design
1. define protocol objectives
Identify the problem trying to be solved.
2. define protocol goals
translate objectives into concrete security goals
3. specify protocol
take goals as input and determine
cryptographic primitives
flow
actions
design challenges
it's hard to get the right objectives
it is not always straightforward to identify the right security goals for identified objectives
deviating from standard protocols can lead to insecure protocols
complicated design goals may not fit existing, standard protocols
modifying a standard protocol even slightly may have insecure impacts
hire professionals to do protocol design
protocol examples
PKCS
specifies suite of protocols for public key cryptography
ISO / IEC 117700
specifies suite of protocols for mutual entity authentication
SSL/TLS
specifies protocol for setting up a secure communication channel
attacks on protocols
reflection
http://en.wikipedia.org/wiki/Reflection_attack
man in the middle
http://en.wikipedia.org/wiki/Man-in-the-middle_attack
interleaving
type of man in the middle attack
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Browse Library