Secure key establishment (Q951129)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Secure key establishment |
scientific article |
Statements
Secure key establishment (English)
0 references
29 October 2008
0 references
The book is based on the author's research and presents his work in key establishment area. It has twelve chapters and starts gradually by an introduction in this area and continuously presents the mathematical background of the domain, the analysis of some well known protocols, the discussions about security level of key sharing protocols and proofs for other ones. It is described the way to extend Bellaware-Rogaway model, the proof for Yahalom Protocol and complete review on session key construction. The author consecrates a chapter to describe errors in computational complexity proofs for protocols, which are well covered and explained. Another chapter describes complements about computational protocol analysis, which takes into consideration another way of view, more precisely the author tried to utilize the communication and adversary model from computational proofs in a machine specification and analysis. An integrative framework to protocol analysis and repair it is presented, where the focus is how to develop a particular protocol in some automatic way in terms of a set of property specifications about the application, and not to directly analyze and repair the protocols. The entire book is well edited and has like basement the Ph.D. thesis of the author, which is based on some good articles already published with a good quantity of novelty in the treated domain.
0 references
key establishment
0 references
protocols security
0 references