Secure key establishment (Q951129)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Secure key establishment
scientific article

    Statements

    Secure key establishment (English)
    0 references
    29 October 2008
    0 references
    The book is based on the author's research and presents his work in key establishment area. It has twelve chapters and starts gradually by an introduction in this area and continuously presents the mathematical background of the domain, the analysis of some well known protocols, the discussions about security level of key sharing protocols and proofs for other ones. It is described the way to extend Bellaware-Rogaway model, the proof for Yahalom Protocol and complete review on session key construction. The author consecrates a chapter to describe errors in computational complexity proofs for protocols, which are well covered and explained. Another chapter describes complements about computational protocol analysis, which takes into consideration another way of view, more precisely the author tried to utilize the communication and adversary model from computational proofs in a machine specification and analysis. An integrative framework to protocol analysis and repair it is presented, where the focus is how to develop a particular protocol in some automatic way in terms of a set of property specifications about the application, and not to directly analyze and repair the protocols. The entire book is well edited and has like basement the Ph.D. thesis of the author, which is based on some good articles already published with a good quantity of novelty in the treated domain.
    0 references
    key establishment
    0 references
    protocols security
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references