Cryptographic protocols
The lecture discusses themain properties and vulnerabilities of cryptographic protocols. Some well known examplesof attacks on cryptographic protocols are considered. The second part of the lecture containsan overview of modern protocol verification tools.
Download file
Counter downloads: 648
Keywords
криптографический протокол, аутентификацияAuthors
Name | Organization | |
Cheremushkin A. V. | Institute of Cryptography, Telecommunications and Informatics, Moscow | avc238@mail.ru |
References
Черемушкин А. В. Криптографические протоколы. Основные свойства и уязвимости: учебное пособие. М.: Изд. центр «Академия», 2009. 272 с.
Index of the security protocols repository (SPORE) / / Laboratorie Specification et Verification. http://www.lsv.ens-cachan.fr/spore/table.html.
Clark J., Jacob J. A Survey of Authentication Protocol Literature: Version 1.0. 17 Nov. 1997. http://www.cs.york.ac.uk/ jac/papers/drareview.ps.gz, 1997.
Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of applied cryptography. Boca Raton, New York, London, Tokyo: CRC Press, 1997. 780 p.
Cremers C. J. F., Lafourcade P. Comparing State Spaces in Automatic Security Protocol Verification. ETH Technical Report. 2007. No. 558. 26 p.
