Chapter 7. Cryptographic Protocols

  1. Günter Schäfer

Published Online: 17 MAR 2006

DOI: 10.1002/0470863722.ch7

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

How to Cite

Schäfer, G. (2003) Cryptographic Protocols, in Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/0470863722.ch7

Author Information

  1. Technische Universität, Berlin, Germany

Publication History

  1. Published Online: 17 MAR 2006
  2. Published Print: 30 DEC 2003

ISBN Information

Print ISBN: 9780470863701

Online ISBN: 9780470863725

SEARCH

Keywords:

  • cryptographic protocols;
  • secret splitting and secret sharing;
  • blind signature protocol;
  • authentication and key distribution;
  • data origin authentication and data integrity;
  • Needham–Schroeder protocol;
  • Kerberos authentication protocol;
  • GNY-Logic;
  • inter-realm authentication;
  • Perfect Forward Secrecy

Summary

This chapter contains sections titled:

  • Properties and Notation of Cryptographic Protocols

  • Data Origin and Entity Authentication

  • Needham–Schroeder Protocol

  • Kerberos

  • International Standard X.509

  • Security of Negotiated Session Keys

  • Formal Validation of Cryptographic Protocols

  • Summary

  • Supplemental Reading

  • Questions