Skip to main content
  • Book
  • © 2003

Protocols for Authentication and Key Establishment

  • Clear and uniform description of a comprehensive range of protocols and attacks
  • Thorough referencing of the recent and established literature
  • A tutorial introduction for the beginner to the subject
  • Coverage of protocol standards
  • Comparison of protocol features and efficiency
  • Overview of protocol analysis techniques
  • Includes supplementary material: sn.pub/extras

Part of the book series: Information Security and Cryptography (ISC)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (7 chapters)

  1. Front Matter

    Pages I-XXIV
  2. Goals for Authentication and Key Establishment

    • Colin Boyd, Anish Mathuria
    Pages 33-72
  3. Protocols Using Shared Key Cryptography

    • Colin Boyd, Anish Mathuria
    Pages 73-106
  4. Authentication and Key Transport Using Public Key Cryptography

    • Colin Boyd, Anish Mathuria
    Pages 107-135
  5. Key Agreement Protocols

    • Colin Boyd, Anish Mathuria
    Pages 137-199
  6. Conference Key Protocols

    • Colin Boyd, Anish Mathuria
    Pages 201-246
  7. Password-Based Protocols

    • Colin Boyd, Anish Mathuria
    Pages 247-288
  8. Back Matter

    Pages 289-323

About this book

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Reviews

From the reviews:

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)

Authors and Affiliations

  • School of Software Engineering and Data Communications, Queensland University of Technology, Brisbane, Australia

    Colin Boyd

  • Dhirubhai Ambani Institute of Information & Communication Technology, Gandhinagar, Gujarat, India

    Anish Mathuria

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access