Chapter 26: Analyses of key exchange protocols

Abstract

This chapter introduces the modeling of key exchange protocols based on truly concurrent process algebra.

Keywords

Key Exchange Protocols; Process Algebra; True Concurrency

In this chapter, we will introduce several key exchange protocols, including key exchange protocols with symmetric cryptography in Section 26.1 and public key cryptography in Section 26.2, interlock protocol against man-in-the-middle attack in Section 26.3, key exchange protocol with digital signature in Section 26.4, key and message transmission protocol in Section 26.5, and key and message broadcast protocol in Section 26.6.

26.1 Key exchange with symmetric cryptography

The protocol shown in Fig. 26.1 uses symmetric keys for ...

Get Handbook of Truly Concurrent Process Algebra now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.