Chapter 40

Password-based Authenticated Key Establishment Protocols

Jean Lancrenon,    Interdisciplinary Centre for Security Reliability and Trust (SnT)

Dalia Khader,    Interdisciplinary Centre for Security Reliability and Trust (SnT)

Peter Y.A. Ryan,    Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, CSC

Feng Hao,    Newcastle University

1 Introduction to Key Exchange

What Are Key Exchange Protocols?

One of the main goals of cryptography is to provide secure communication channels between different parties. Security here means various flavors of data secrecy, message integrity, and communicant authenticity. One way to construct secure channels between parties is for them to share suitable keys that ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.