null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
56030
Crypto U9, Cryptographic Protocols
Descripción
(Unit 9 - cryptographic protocols) IYM002 Mapa Mental sobre Crypto U9, Cryptographic Protocols, creado por jjanesko el 24/04/2013.
Sin etiquetas
iym002
unit 9 - cryptographic protocols
iym002
unit 9 - cryptographic protocols
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace casi 12 años
135
10
0
Resumen del Recurso
Crypto U9, Cryptographic Protocols
specification of all events needed in order to achieve a requried security goal
specifies 4 things
protocol assumptions
protocol flow
communication steps in protocol
protocol messages
kind of content in messages
protocol actions
any action an entity needs to perform before sending or after receiving a message
stages of protocol design
1. define protocol objectives
Identify the problem trying to be solved.
2. define protocol goals
translate objectives into concrete security goals
3. specify protocol
take goals as input and determine
cryptographic primitives
flow
actions
design challenges
it's hard to get the right objectives
it is not always straightforward to identify the right security goals for identified objectives
deviating from standard protocols can lead to insecure protocols
complicated design goals may not fit existing, standard protocols
modifying a standard protocol even slightly may have insecure impacts
hire professionals to do protocol design
protocol examples
PKCS
specifies suite of protocols for public key cryptography
ISO / IEC 117700
specifies suite of protocols for mutual entity authentication
SSL/TLS
specifies protocol for setting up a secure communication channel
attacks on protocols
reflection
http://en.wikipedia.org/wiki/Reflection_attack
man in the middle
http://en.wikipedia.org/wiki/Man-in-the-middle_attack
interleaving
type of man in the middle attack
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8 (part 3), entity authentication
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Explorar la Librería