Abstract
Cryptographic protocols are communication protocols which are designed to provide security assurances of various kinds, using cryptographic mechanisms. This chapter gives a brief introduction of cryptographic protocols and the reason why we study these protocols.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Keywords
- Medium Access Control
- Authentication Protocol
- Cryptographic Protocol
- Entity Authentication
- Secure Electronic Transaction
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Menezes A, van Oorschot P, Vanstone S (1996) Handbook of Applied Cryptography. CRC Press, New York
Goldreich O (2003) Foundations of Cryptography. Cambridge University Press, New York
Mao W (2004) Modern Cryptography: Theory and Practice. Prentice Hall, New Jersey
Stallings W (2006) Cryptography and Network Security: Principles and Practice, 4th edn. Prentice Hall, New Jersey
Stinson DR (2003) Cryptography: Theory and Practice, 2nd edn. CRC Press, New York
Woo TYC, Lam SS (1992) Authentication for Distributed Systems. Computer 25(1): 39–52
Feige U, Fiat A, Shamir A (1987) Zero Knowledge Proofs of Identify. In: STOC’87 Proceedings of the Nineteenth Annual ACM symposium on Theory of computing, New York, 25–27 May 1987
Okamoto T (1993) Provably Secure and Practical Identification Schemes and Corresponding Signature Scheme. In: CRYPTO’92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara 16–20 Aug 1992. Lecture notes in computer science, vol 740, pp 31–53, Springer
Needham RM, Schroeder MD (1978) Using Encryption for Authentication in Large Network of Computers. Communication of the ACM 21(12): 993–999
Harkins D, Carrel D (1998) The Internet Key Exchange Protocol (IKE), RFC 2409. http://www.ietf.org/rfc/rfc2409.txt. Accessed Dec 2005
Miller SP, Neuman BC, Schiller JI, Saltzer JH (1987) Kerberos Authentication and Authorization System. Paper Presented at the Project Athena Technical Plan Section E.2.1. MIT, Boston
CCITT (1987) CCITT Draft Recommendation X.509. The Directory-Authentication Framework (Version 7), New York
Kaufman C (1993) Distributed Authentication Security Service, RFC 1507. http://www.ietf.org/rfc/rfc1507.txt. Accessed Sept 1993
SET. Secure Electronic Transaction. The SET Standard Specification. http://www.setco.org/set-specifications. Accessed May 1997
IBM Zurich Laboratory (1995) Internet Keyed Payments Protocol (IKP). http://www.zurich.ibm.com /Technology/Security/extern/ecommerce/spec. Accessed 30 June 1995
ANSI/IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Sept 1999
Freier AO, Karlton P, Kocher PC (1996) The SSL Protocol Version 3.0. http://wp.netscape.com/eng/ssl3/draft302.txt. Accessed 18 Nov 1996
IEEE Std 802.11i-2004. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements. July 2004
Lowe G (1995) An Attack on the Needham-Schroeder Public Key Authentication Protocol. Information Processing Letters 56(3): 131–133
Lowe G (1996) Breaking and Fixing the Needham-Schroeder Public-key Protocol Using FDR. In: TACAS’96 Proceedings of the 12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Passau, 27–29 Mar 1996. Lecture Notes in Computer Science (Lecture Notes in Software Configuration Management), vol 1055, pp 147–166, Springer
Kaufman C (2005) Internet Key Exchange (IKEv2) Protocol, RFC 4306. http://tools.ietf.org/html/rfc4306. Accessed Dec 2005
Canetti R, Krawczy H (2001) Analysis of Key-exchange Protocols and Their Use for Building Secure Channels. In: EUROCRYPT’01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, Innsbruck, 6–10 May 2001. Lecture Notes in Computer Science, vol 2045, pp 453–474, Springer
Burrows M, Abadi M, Needham R (1990) A Logic of Authentication. ACM Transactions on Computer Systems 8(1): 18–36
Gong L, Needham R, Yahalom R (1990) Reasoning About Belief in Cryptographic Protocols. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, Oakland, 7–9 May 1990
Syverson PF, Oorschot PCV (1994) On Unifying Some Cryptographic Protocol Logics. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Oakland, 16–18 May 1994
Lowe G (1999) Towards a Completeness Result for Model Checking of Security Protocols. Journal of Computer Security 7(2–3): 89–146
Goldwasser S, Micali S (1984) Probabilistic Encryption. Journal of Computer and System Sciences 28(2): 270–299
Bellare M, Rogaway P (1993) Entity Authentication and Key Distribution. In: CRYPTO’93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 22–26 Aug 1993. Lecture Notes in Computer Science, vol 773, pp 232–249, Springer
Blanchet B (2006) A Computationally Sound Mechanized Prover for Security Protocols. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley/Oakland, 21–24 May 2006
Datta A, Derek A, Mitchell JC, Roy A (2007) Protocol Composition Logic (PCL). Electronic Notes in Theoretical Computer Science 172: 311–358
Canetti R, Herzog J (2006) Universally Composable Symbolic Analysis of Mutual Authentication and Key-exchange Protocols. In: Theory of Cryptography Conference Proceedings of TCC2006, New York, 4–7 Mar 2006
Qing SH (2003) Design and Logical Analysis of Security Protocols. Journal of Software, 14(7): 1301–1309 (in Chinese)
Qing SH (2003) Twenty Years Development of Security Protocols Research. Journal of Software 14(10): 1740–1752 (in Chinese)
Feng DG, Fan H (2003) Security Protocol Theory and Method. Science Press, Beijing (in Chinese)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Dong, L., Chen, K. (2012). Introduction of Cryptographic Protocols. In: Cryptographic Protocol. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24073-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-24073-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24072-0
Online ISBN: 978-3-642-24073-7
eBook Packages: Computer ScienceComputer Science (R0)