Cryptographic protocols | Applied Discrete Mathematics. Supplement. 2009. № 2.

Cryptographic protocols

The lecture discusses themain properties and vulnerabilities of cryptographic protocols. Some well known examplesof attacks on cryptographic protocols are considered. The second part of the lecture containsan overview of modern protocol verification tools.

Download file
Counter downloads: 648

Keywords

криптографический протокол, аутентификация

Authors

NameOrganizationE-mail
Cheremushkin A. V.Institute of Cryptography, Telecommunications and Informatics, Moscowavc238@mail.ru
Всего: 1

References

Черемушкин А. В. Криптографические протоколы. Основные свойства и уязвимости: учебное пособие. М.: Изд. центр «Академия», 2009. 272 с.
Index of the security protocols repository (SPORE) / / Laboratorie Specification et Verification. http://www.lsv.ens-cachan.fr/spore/table.html.
Clark J., Jacob J. A Survey of Authentication Protocol Literature: Version 1.0. 17 Nov. 1997. http://www.cs.york.ac.uk/ jac/papers/drareview.ps.gz, 1997.
Menezes A. J., van Oorschot P. C., Vanstone S. A. Handbook of applied cryptography. Boca Raton, New York, London, Tokyo: CRC Press, 1997. 780 p.
Cremers C. J. F., Lafourcade P. Comparing State Spaces in Automatic Security Protocol Verification. ETH Technical Report. 2007. No. 558. 26 p.
 Cryptographic protocols | Applied Discrete Mathematics. Supplement. 2009. № 2.

Cryptographic protocols | Applied Discrete Mathematics. Supplement. 2009. № 2.