Skip to main content
  • Book
  • © 2009

Secure Key Establishment

  • Introduces several improved protocols with new proofs of security
  • Identifies several variants of the key sharing requirement including a brief discussion regarding the key sharing requirement
  • Provides an integrative framework that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool

Part of the book series: Advances in Information Security (ADIS, volume 41)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 chapters)

  1. Front Matter

    Pages 1-21
  2. Introduction

    • Kim-Kwang Raymond Choo
    Pages 1-18
  3. Background Materials

    • Kim-Kwang Raymond Choo
    Pages 1-37
  4. A Flawed BR95 Partnership Function

    • Kim-Kwang Raymond Choo
    Pages 1-14
  5. On The Key Sharing Requirement

    • Kim-Kwang Raymond Choo
    Pages 1-12
  6. An Extension to the Bellare–Rogaway Model

    • Kim-Kwang Raymond Choo
    Pages 1-16
  7. A Proof of Revised Yahalom Protocol

    • Kim-Kwang Raymond Choo
    Pages 1-12
  8. On Session Key Construction

    • Kim-Kwang Raymond Choo
    Pages 1-16
  9. Complementing Computational Protocol Analysis

    • Kim-Kwang Raymond Choo
    Pages 1-28
  10. Conclusion and Future Work

    • Kim-Kwang Raymond Choo
    Pages 1-5
  11. Back Matter

    Pages 1-1

About this book

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Authors and Affiliations

  • Australian Institute of Criminology , Canberra, Australia

    Kim-Kwang Raymond Choo

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access