密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] pdf epub mobi txt 電子書 下載 2024

圖書介紹


密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness]


董玲,陳剋非 著



點擊這裡下載
    


想要找書就要到 求知書站
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

发表于2024-11-21

類似圖書 點擊查看全場最低價

齣版社: 高等教育齣版社
ISBN:9787040313314
版次:1
商品編碼:10867858
包裝:精裝
外文名稱:Cryptographic Proto-col:Security Analysics Based on Trusted Freshness
開本:16開
齣版時間:2011-10-01
頁數:373
正文語種:英文

密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] epub 下載 mobi 下載 pdf 下載 txt 電子書 下載 2024

相關圖書



密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] epub 下載 mobi 下載 pdf 下載 txt 電子書 下載 2024

密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] pdf epub mobi txt 電子書 下載 2024



具體描述

內容簡介

《密碼協議:基於可信任新鮮性的安全性分析(英文版)》主要介紹如何利用係統工程思想和可信任新鮮性的方法,分析和設計密碼通信協議。作者基於可信任的新鮮性標識符概念,提齣瞭一個新穎的新鮮性原則。該原則指齣瞭一種有效的、易用的密碼協議安全性分析方法。使用這種分析方法,可以有效檢驗協議在實際應用中能否滿足安全需要。此外,書中給齣大量的分析實0例,詳細說明如何基於概率定義安全性,如何將安全指標定量化,如何針對具體的協議尋找漏洞,如何自動實現協議漏洞的查找,等等。
《密碼協議:基於可信任新鮮性的安全性分析(英文版)》總結瞭作者近年來的研究成果,這些成果的有效性和易用性對從事通信協議安全性研究的人員,特彆是工程技術人員,具有很好的參考和實用價值。董玲網絡係統建設和信息安全領域高級工程師,上海交通大學密碼與信息安全實驗室兼職教授、研究興趣是信息安全和應用密碼學,特彆是實際應用的密碼通信協議和密碼係統的安全性分析。陳剋非上海交通大學計算機科學與工程係教授,長期從事密碼與信息安全理論研究。主要研究興趣是序列密碼、可證明安全、密碼協議分析、數據安全。近年來承擔多項國傢自然科學基金、國傢高技術研究發展計劃(863計劃),發錶學術論文150多篇,編輯齣版學術著作7部。

目錄

l Introduction of Cryptographic Protocols
1.1 Information security and cryptography
1.2 Classes of cryptographic protocols
1.2.1 Authentication protocol
1.2.2 Kev establishment protocol
1.2.3 Electronic commerce protocol
1.2.4 Secure multi-party protocol
1.3 Security of cryptographic protocols
1.4 Motivations of this book
References

2 Background of Cryptographic Protocols
2.1 Preliminaries
2.1.1 Functions
2.1.2 Terminology
2.2 Cryptographic primitives
2.2.1 Cryptology
2.2.2 Symmetric-key encryption
2.2.3 Public-key encryption
2.2.4 Digital signatures
2.2.5 Hash Functions
2.2.6 Message authentication
2.3 Cryptographic protocols
2.3.1 Secure channel
2.3.2 Principals
2.3.3 Time-variant parameters
2.3.4 Challenge and response
2.3.5 Other classes of cryptographic protocols
2.4 Security of cryptographic protoco
2.4.1 Attacks on primitives
2.4.2 Attacks on protocols
2.4.3 Security of protocols
2.4.4 Analysis methods for protocol security
2.5 Communication threat model
2.5.1 Dolev-Yao threat model
2.5.2 Assumptions ofprotoc01 environment
2.5.3 Expressions of cryptographic protocols
References

3 Engineering Principles for Security Design of Protocols
3.1 Introduction of engineering principles
3.1.1 Prudent engineering principles
3.1.2 Cryptographic protocol engineering principles
3.2 Protocol engineering requirement analysis
3.2.1 Security requirement analysis
3.2.2 Plailltext analysis
3.2.3 Application environment analysis
3.2.4 Attack model and adversary abilities analysis
3.2.5 Cryptographic service requirement analysis
3.3 Detailed protocol design
3.3.1 Liveness of the principal’S identity
3.3.2 neshness and association of time-variant parameter
3.3.3 Data integrity protection of message
3.3.4 Stepwise refinement
3.4 Provable security References.

4 Informal Analysis Schemes of Cryptographic Protocols
4.1 The security of cryptographic protocols
4.1.1 Authenticity and confidentiality under computational model
4.1.2 Security definitions
4.2 Security mechanism based on trusted freshenss
4.2.1 Notions
4.2.2 Freshness principle
4.2.3 Security of authentication protoc01
4.2.4 Manual analysis based on trusted freshness
4.2.5 Application of security analysis based on trusted freshness
4.3 Analysis of classic attacks
4.3.1 Man in the middle attack
4.3.2 Source-substitution attack
……
5 Security Analysis of Real World Protocols
6 Guarantee of Cryptographic Protocol Security
7 Formalism of Protocol Security Analysis
8 Design of Cryptographic Protocols Based on Trusted
9 Automated Analysis of Cryptographic Protocols
Index

精彩書摘

Over the ages,information was typically stored and transmitted on paper,whereas much of it now resides on magnetic media and iS transmitted via computer networks.As we all know.it iS much easier to copy and alterinformation stored and transmitted electronically than that on paper.Infor-mation security intends to provide security services for information in digitalform·Information security objectives include confidentiality,data integrity,authentication,non-repudiation,access control,availability,fairness and SO on·Computer and network security research and development foCUS on thefirst four general security services,from which other security services,such as access control,and fairness can be derived[蔔引.Many terms and COnceptsin this book are from Ref_[1]which is well addressed.For strict 0r inquisitive readers,please refer to book 11 for detailed information.一Confidentiality is a service used to keep the content of information from aU but those authorized to have it.That is,the information in a computer systern or transmitted information cannot be comprehended by unau- thorized parties·Secrecy IS a term synonymous with confidentiality and privacy.
……
密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] 下載 mobi epub pdf txt 電子書
密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] pdf epub mobi txt 電子書 下載
想要找書就要到 求知書站
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

用戶評價

評分

評分

評分

評分

評分

評分

評分

評分

評分

類似圖書 點擊查看全場最低價

密碼協議:基於可信任新鮮性的安全性分析(英文版) [Cryptographic Proto-col:Security Analysics Based on Trusted Freshness] pdf epub mobi txt 電子書 下載





相關圖書


本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 tushu.tinynews.org All Rights Reserved. 求知書站 版权所有