Chapter 12 Contents
12 Key Establishment Protocols12.1 Introduction 12.2 Classification and framework 12.2.1 General classification and fundamental concepts 12.2.2 Objectives and properties 12.2.3 Assumptions and adversaries in key establishment protocols 12.3 Key transport based on symmetric encryption 12.3.1 Symmetric key transport and derivation without a server 12.3.2 Kerberos and related server-based protocols 12.4 Key agreement based on symmetric techniques 12.5 Key transport based on public-key encryption 12.5.1 Key transport using PK encryption without signatures 12.5.2 Protocols combining PK encryption and signatures 12.5.3 Hybrid key transport protocols using PK encryption 12.6 Key agreement based on asymmetric techniques 12.6.1 Diffie-Hellman and related key agreement protocols 12.6.2 Implicitly-certified public keys 12.6.3 Diffie-Hellman protocols using implicitly-certified keys 12.7 Secret sharing 12.7.1 Simple shared control schemes 12.7.2 Threshold schemes 12.7.3 Generalized secret sharing 12.8 Conference keying 12.9 Analysis of key establishment protocols 12.9.1 Attack strategies and classic protocol flaws 12.9.2 Analysis objectives and methods 12.10 Notes and further references
Return to the Table of contents