Chapter 40

Password-based Authenticated Key Establishment Protocols

Jean Lancrenon,    Interdisciplinary Centre for Security Reliability and Trust (SnT)

Dalia Khader,    Interdisciplinary Centre for Security Reliability and Trust (SnT)

Peter Y.A. Ryan,    Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, CSC

Feng Hao,    Newcastle University

1 Introduction to Key Exchange

What Are Key Exchange Protocols?

One of the main goals of cryptography is to provide secure communication channels between different parties. Security here means various flavors of data secrecy, message integrity, and communicant authenticity. One way to construct secure channels between parties is for them to share suitable keys that ...

Get Computer and Information Security Handbook, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.