l Introduction of Cryptographic Protocols 1.1 Information security and cryptography 1.2 Classes of cryptographic protocols 1.2.1 Authentication protocol 1.2.2 Kev establishment protocol 1.2.3 Electronic commerce protocol 1.2.4 Secure multi-party protocol 1.3 Security of cryptographic protocols 1.4 Motivations of this book References
2 Background of Cryptographic Protocols 2.1 Preliminaries 2.1.1 Functions 2.1.2 Terminology 2.2 Cryptographic primitives 2.2.1 Cryptology 2.2.2 Symmetric-key encryption 2.2.3 Public-key encryption 2.2.4 Digital signatures 2.2.5 Hash Functions 2.2.6 Message authentication 2.3 Cryptographic protocols 2.3.1 Secure channel 2.3.2 Principals 2.3.3 Time-variant parameters 2.3.4 Challenge and response 2.3.5 Other classes of cryptographic protocols 2.4 Security of cryptographic protoco 2.4.1 Attacks on primitives 2.4.2 Attacks on protocols 2.4.3 Security of protocols 2.4.4 Analysis methods for protocol security 2.5 Communication threat model 2.5.1 Dolev-Yao threat model 2.5.2 Assumptions ofprotoc01 environment 2.5.3 Expressions of cryptographic protocols References
3 Engineering Principles for Security Design of Protocols 3.1 Introduction of engineering principles 3.1.1 Prudent engineering principles 3.1.2 Cryptographic protocol engineering principles 3.2 Protocol engineering requirement analysis 3.2.1 Security requirement analysis 3.2.2 Plailltext analysis 3.2.3 Application environment analysis 3.2.4 Attack model and adversary abilities analysis 3.2.5 Cryptographic service requirement analysis 3.3 Detailed protocol design 3.3.1 Liveness of the principal’S identity 3.3.2 neshness and association of time-variant parameter 3.3.3 Data integrity protection of message 3.3.4 Stepwise refinement 3.4 Provable security References.
4 Informal Analysis Schemes of Cryptographic Protocols 4.1 The security of cryptographic protocols 4.1.1 Authenticity and confidentiality under computational model 4.1.2 Security definitions 4.2 Security mechanism based on trusted freshenss 4.2.1 Notions 4.2.2 Freshness principle 4.2.3 Security of authentication protoc01 4.2.4 Manual analysis based on trusted freshness 4.2.5 Application of security analysis based on trusted freshness 4.3 Analysis of classic attacks 4.3.1 Man in the middle attack 4.3.2 Source-substitution attack …… 5 Security Analysis of Real World Protocols 6 Guarantee of Cryptographic Protocol Security 7 Formalism of Protocol Security Analysis 8 Design of Cryptographic Protocols Based on Trusted 9 Automated Analysis of Cryptographic Protocols Index
精彩书摘
Over the ages,information was typically stored and transmitted on paper,whereas much of it now resides on magnetic media and iS transmitted via computer networks.As we all know.it iS much easier to copy and alterinformation stored and transmitted electronically than that on paper.Infor-mation security intends to provide security services for information in digitalform·Information security objectives include confidentiality,data integrity,authentication,non-repudiation,access control,availability,fairness and SO on·Computer and network security research and development foCUS on thefirst four general security services,from which other security services,such as access control,and fairness can be derived[卜引.Many terms and COnceptsin this book are from Ref_[1]which is well addressed.For strict 0r inquisitive readers,please refer to book 11 for detailed information.一Confidentiality is a service used to keep the content of information from aU but those authorized to have it.That is,the information in a computer systern or transmitted information cannot be comprehended by unau- thorized parties·Secrecy IS a term synonymous with confidentiality and privacy. ……