DOC PREVIEW
UT CS 361 - Lecture 58: Cryptographic Protocols: Abstract View

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Foundations of Computer SecurityLecture 58: Cryptographic Protocols: Abstract ViewDr. Bill YoungDepartment of Computer SciencesUniversity of Texas at AustinLecture 58: 1 Cryptographic Protocols: Abstract ViewCryptographic ProtocolsA protocol involves a sequence of message exchanges of the form:A → B : Mmeaning that principal A sends to principal B the message M.There’s a “temporal” aspect to protocols. Until and unless Breceives the message, he can’t respond to it.In general, B won’t be expecting the message unless he has alreadyparticipated in earlier steps of the protocol.Lecture 58: 2 Cryptographic Protocols: Abstract ViewTaking an Abstract ViewThere is a lot involved in making a protocol work, particularly atthe implementation level.We’ll ignore issues like:What are the mechanisms of message transmission?How does a principal know when decryption has succeeded?How can you reliably parse a message of multiple components?If a message contains the name of a principal, what is theform of that name?How are public keys maintained and distributed?Those are all important issues, but we want to look at protocolsabstractly.Lecture 58: 3 Cryptographic Protocols: Abstract ViewProtocol QuestionsAn analysis of any protocol attempts to answer the following typesof questions:What are the goals of the protocol?What does the protocol actually achieve?Does it achieve its stated objective?Does it include unnecessary steps or messages?What assumptions are made?Does it encrypt items that could be sent in the clear?Is it susceptible to attack? What would an attack look like?Lecture 58: 4 Cryptographic Protocols: Abstract ViewLessonsWe want to look at protocols abstractly and ignore issues atthe implementation level.A standard set of questions can be asked of any cryptographicprotocol.Next lecture: Attacks on Cryptographic ProtocolsLecture 58: 5 Cryptographic Protocols: Abstract


View Full Document

UT CS 361 - Lecture 58: Cryptographic Protocols: Abstract View

Documents in this Course
Load more
Download Lecture 58: Cryptographic Protocols: Abstract View
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture 58: Cryptographic Protocols: Abstract View and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 58: Cryptographic Protocols: Abstract View 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?