Protocols for authentification and key establishment (Q1872784)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Protocols for authentification and key establishment |
scientific article |
Statements
Protocols for authentification and key establishment (English)
0 references
15 May 2003
0 references
Protocols for authentication and key establishment are the foundation for the security of communications. The range and diversity of these protocols is immense, while the variation in the properties and vulnerabilities of different protocols can be remarkably subtle. This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. The first two chapters are introductory and may be useful for the graduate student, or anyone coming to the field for the first time. Material in the remaining five chapters is arranged thematically to help the reader identify connections between different protocols. Between them, these five chapters survey more than 150 protocols from the literature. Ch.\,1, A Tutorial Introduction to Authentication and Key Establishment, starts with a tutorial aimed at explaining the general methods of how protocols work and the typical capabilities of protocol adversaries. Definitions for the basic protocol components follow, including a quick overview of cryptographic algorithms and their properties, as well as a list of typical protocol attacks. Ch.\,2, Goals for Authentication and Key Establishment, is devoted to a study of the different goals that protocols for authentication and key establishment may have. This is a critical part of understanding protocol analysis, and neglect of this issue has been the source of much error in the past. The chapter develops a hierarchy of different goals, considering only extensional goals. This hierarchy is used in subsequent chapters to evaluate various protocols. The hierarchy provides a simple yet effective tool for describing protocol properties and for evaluating attacks against protocols with unclear goals. The last section contains a brief survey of formal protocol analysis techniques, broadly divided into those using formal specification and those using complexity-theoretic proofs. Ch.\,3, Protocols Using Shared Key Cryptography, is concerned with protocols that employ symmetric cryptography. Many of these protocols involve an on-line trusted third party, in the tradition established by Needham and Schroeder. Ch.\,4, Authentication and Key Transport Using Public Key Cryptography, deals with protocols using public key cryptography, but excluding key agreement protocols. Some standardized protocols and also some protocols in wide use today, such as the Transport Layer Security protocol, are included. Ch.\,5, Key Agreement Protocols, is concerned with key agreement based on public keys. Most of the protocols in this chapter are based on the Diffie-Hellman key exchange. There is a vast range of protocols in this class, and consequently this is the longest chapter. There is also a treatment of identity-based key agreement protocols. Much of Ch.\,6, Conference Key Protocols, concerns generalizations of protocols from Ch.\,5 to the multi-party setting. In particular, Diffie-Hellman key agreement with multiple parties is discussed in some detail. A topic that is not treated in any depth in this chapter is that of dynamic conferences. Ch.\,7 deals with Password-Based Protocols first developed not much over 10 years ago. Recently there have been many new protocols proposed in this area, and the authors take into account the most important of these. Appendix A is a brief overview of published \textit{Standards for Authentication and Key Establishment} protocols. This book will prove useful both to those who wish to learn more about the field and as a reference for those looking for tasks such as finding whether an established protocol exists for a specific application, or whether any attacks are known on a specific protocol or on related protocols.
0 references
protocols for authentication
0 references
key establishment protocols
0 references
protocol architectures
0 references
cryptographic algorithms
0 references
confidentiality
0 references
data origin authentication
0 references
data integrity
0 references
freshness
0 references
attack on protocols
0 references
certificate manipulation
0 references
forward secrecy
0 references
key compromise impersonation
0 references
shared key cryptography
0 references
server-based key establishment
0 references
public key cryptography
0 references
key transport protocols
0 references
key agreement protocols
0 references
unknown key-share attacks
0 references
conference key protocols
0 references
key broadcasting
0 references
number theory
0 references
secret sharing
0 references
password-based protocols
0 references