null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
58662
Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
Descripción
(Unit 9 - cryptographic protocols) IYM002 Mapa Mental sobre Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE), creado por jjanesko el 27/04/2013.
Sin etiquetas
iym002
unit 9 - cryptographic protocols
iym002
unit 9 - cryptographic protocols
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
124
9
0
Resumen del Recurso
Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
security objectives
need to authenticate key holders
need to prolong authentication so communication over time can take place
typical security goals
mutual entity authentication
mutual data origin authentication
mutual key establishment
key confidentiality
key freshness
mutual key confirmation
unbiased key control
Alice and Bob should be happy that neither party has unduly influenced the generation of the key
Bob and Alice create part of the key by each providing some randomness
There is a trusted 3rd party used to generate the key
Diffie Hellman Agreement Protocol
assumptions
public key crypto system with the property that public keys of differen users can be numbers over the same modulus p
a combination function where it does not matter in which order the exponentiations are conducted
Goals
mutual entity authentication
none provided
mutual data origin authentication
none provided
key confidentiality
do establish common symmetric key
key confidentiality
achieved because of hardness of equation
key freshness
achievable assuming Alice and Bob choose fresh private values
mutual key confirmation
not provided
unbiased key control
both Bob and Alice contribute
cryptographic primitives, actions, flow
El Gamal
open to man in the middle attacks
Station to Station protocol
based on Diffie Hellman, uses digital signatures & certificates
solves Diffie Hellman protocol authentication & mutual key confirmation problems
ISO 9798-2 Trusted Third Party AKE (simplified version)
assumptions
Alice has a shared symmetric key with with TTP
Bob has a shared symmetric key with TTP
Alice & Bob can generate nonces
cryptographic primitives, actions, flow
Goals
mutual entity authentication
achieved because of trust in TTP
mutual data origin authenication
achieved even without a MAC
mutual key establishment
achieved
key confidentiality
achieved
key freshness
achieved so long as the TTP generates fresh keys
mutual key confirmation
achieved
unbiased key control
achieved
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Crypto U9, Cryptographic Protocols
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Explorar la Librería