tailieunhanh - Ebook Modern Cryptography - Theory and Practice: Phần 2

Part 1 of the book serial ebook Pc Underground to part 2 of you will continue to learn about relevant issues such as: authentication protocols — principles, authentication protocols — the real world, authentication framework for public-key cryptography, formal and strong security definitions for public-key cryptosystems,. Document serve you specialized information technology and related industries. | Chapter 11. Authentication Protocols Principles Section . Introduction Section . Authentication and Refined Notions Section . Convention Section . Basic Authentication Techniques Section . Password-based Authentication Section . Authenticated Key Exchange Based on Asymmetric Cryptography Section . Typical Attacks on Authentication Protocols Section . A Brief Literature Note Section . Chapter Summary Exercises Introduction InChapter 2 we have exposed ourselves to a number of authentication protocols. Most protocols there are fictional ones with two exceptions we have deliberately designed them to be flawed in several ways in order for them to serve as an introduction to a culture of caution and vigilance in the areas of cryptography and information security. In this chapter we return to the topic of authentication. The purpose of returning to the topic is for us to have a more comprehensive study of the area. Our study in this chapter will be divided into two categories An Introduction to Various Authentication Techniques In this category we shall study various basic techniques for authentication. These include the very basic mechanisms and protocol constructions for message and entity authentication password-based authentication techniques and some important authenticated key establishment techniques. We believe that a number of basic authentication mechanisms and protocol constructions in several international standards are tile ones which have been sefocted from tne literature and subsequently gone through a careful and tong precess of expert review and improvement rewsren. Therefore in our introduction to the basic authentication techniques we shall pay particular attention to the mechanisms which have been standardized by international standard bodies. In addition we shall introduce a few other reputable authentication and authenticated key establishment protocols. We believe that authentication mechanisms and protocols

TỪ KHÓA LIÊN QUAN