Protocols for Authentication and Key Establishment
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the firs
- PDF / 32,964,453 Bytes
- 343 Pages / 439.37 x 666.142 pts Page_size
- 43 Downloads / 212 Views
Associate Editors Martin Abadi Ross Anderson Mihir Bellare Oded Goldreich Tatsuaki Okamoto Paul van Oorschot Birgit Pfitzmann Aviel D. Rubin Jacques Stern
Springer-Verlag Berlin Heidelberg GmbH
Colin Boyd • Anish Mathuria
Protocols for Authentication and Key Establishment With 12 Figures and 31 Tables
. . Springer .184'). .".
Authors Colin Boyd School of Software Engineering and Data Communications Queensland University of Technology GPO Box 2434, Brisbane Q4001 Australia c. [email protected]
Anish Mathuria Dhirubhai Ambani Institute of Information & Communication Technology Gandhinagar-382 009 Gujarat India [email protected]
Series Editors Ueli Maurer Inst. fur Theoretische Informatik ETH Zurich, 8092 Zurich Switzerland
Ronald 1. Rivest MIT, Dept. of Electrical Engineering and Computer Science 545 Technology Square, Room 324 Cambridge, MA 02139 USA
Library of Congress Cataloging-in-Publication Data Boyd, Colin. Protocols for authentication and key establishment Colin A. Boyd, Anish Mathuria. p.cm. -- (Information security and cryptography) Includes bibliographical references and index. ISBN 978-3-642-07716-6 ISBN 978-3-662-09527-0 (eBook) DOI 10.1007/978-3-662-09527-0 1. Computer networks--Security measures. 2. Computer network protocols. 3. Data encryption (Computer science) 4. Public key infrastructure (computer security) I. Mathuria, Anish, 1967- II. Title. III. Series. TK5105.59.B592003 005.8' 2--dc21 2003054427
ACM Subject Classification (1998): K.6.S
ISBN 978-3-642-07716-6 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfIlm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Vc:rIagBcrlinHeideibergGmbH. Violations are liable for prosecution under the German Copyright Law. http://www.springer.de © Springer-Verlag Berlin Heidelberg 2003
Originally published by Sprioger-Verlag Berlin Heidelberg New York in 2003 Softcover reprint of the hudcover 1st edition 2003 The use of general descriptive names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by the authors Cover Design: KiinkelLopka, Heidelberg Printed on acid-free paper 06/3142PS - 5 4 3 2 1 0
To the memory of my father Thou thy worldly task hast done
To my wife, Hemal
Preface
Authentication and key establishment are fundamental building blocks for securing electronic communications. Cryptographic algorithms for encryption and integrity cannot perform their function unless secure keys have been established and the users know which parties s