Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Tài liệu Security Protocols: They’re so NOT Easy! pdf
Nội dung xem thử
Mô tả chi tiết
Security Protocols: They’re so NOT
Easy!
Lecture Motivation
In the last lecture we looked at some high-level descriptions of
key distribution and agreement schemes.
These protocols cannot be used as they were stated.
In implementation of the actual protocol, there are many
situations one should be careful of.
In this lecture, we will look at some common protocol failures
that arise when trying to implement security protocols
We will then look at some specific examples of security
protocols
Lecture Outline
Some stories from the Dark Side…
Design Principles for building security protocols
Key tools for building robust security protocols
– Naming
– Encryption
– Signing
– Timestamps and nonces
Examples as we go…
– Wide-Mouthed Frog
– Denning-Sacco
– Woo-Lam
– Needham-Schroeder
We’ll end with a look at Kerberos