null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
56030
Crypto U9, Cryptographic Protocols
Descrição
IYM002 (Unit 9 - cryptographic protocols) Mapa Mental sobre Crypto U9, Cryptographic Protocols, criado por jjanesko em 24-04-2013.
Sem etiquetas
iym002
unit 9 - cryptographic protocols
iym002
unit 9 - cryptographic protocols
Mapa Mental por
jjanesko
, atualizado more than 1 year ago
Mais
Menos
Criado por
jjanesko
mais de 11 anos atrás
132
10
0
Resumo de Recurso
Crypto U9, Cryptographic Protocols
specification of all events needed in order to achieve a requried security goal
specifies 4 things
protocol assumptions
protocol flow
communication steps in protocol
protocol messages
kind of content in messages
protocol actions
any action an entity needs to perform before sending or after receiving a message
stages of protocol design
1. define protocol objectives
Identify the problem trying to be solved.
2. define protocol goals
translate objectives into concrete security goals
3. specify protocol
take goals as input and determine
cryptographic primitives
flow
actions
design challenges
it's hard to get the right objectives
it is not always straightforward to identify the right security goals for identified objectives
deviating from standard protocols can lead to insecure protocols
complicated design goals may not fit existing, standard protocols
modifying a standard protocol even slightly may have insecure impacts
hire professionals to do protocol design
protocol examples
PKCS
specifies suite of protocols for public key cryptography
ISO / IEC 117700
specifies suite of protocols for mutual entity authentication
SSL/TLS
specifies protocol for setting up a secure communication channel
attacks on protocols
reflection
http://en.wikipedia.org/wiki/Reflection_attack
man in the middle
http://en.wikipedia.org/wiki/Man-in-the-middle_attack
interleaving
type of man in the middle attack
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U10 (part 2), Key Management and Lifecycle
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Explore a Biblioteca