Authors:
- Introduces several improved protocols with new proofs of security
- Identifies several variants of the key sharing requirement including a brief discussion regarding the key sharing requirement
- Provides an integrative framework that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool
Part of the book series: Advances in Information Security (ADIS, volume 41)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (12 chapters)
-
Front Matter
-
Back Matter
About this book
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Authors and Affiliations
-
Australian Institute of Criminology , Canberra, Australia
Kim-Kwang Raymond Choo
Bibliographic Information
Book Title: Secure Key Establishment
Authors: Kim-Kwang Raymond Choo
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-0-387-87969-7
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag US 2009
Hardcover ISBN: 978-0-387-87968-0Published: 04 December 2008
Softcover ISBN: 978-1-4419-4689-8Published: 25 November 2010
eBook ISBN: 978-0-387-87969-7Published: 25 October 2008
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: XXIV, 216
Number of Illustrations: 24 b/w illustrations
Topics: Cryptology, Data Structures and Information Theory, Systems and Data Security, Computer Communication Networks, Coding and Information Theory