Cet ouvrage fait partie de la bibliothèque YouScribe
Obtenez un accès à la bibliothèque pour le lire en ligne
En savoir plus

Introduction to cryptographic protocols

De
14 pages
Introduction to cryptographic protocols Bruno Blanchet INRIA, École Normale Supérieure, CNRS September 2011 (Partly based on slides by Stéphanie Delaune) Bruno Blanchet (INRIA) Introduction to cryptographic protocols September 2011 1 / 29 Cryptographic protocols Cryptographic protocols small programs designed to secure communication (various security goals) use cryptographic primitives (e.g. encryption, hash function, Bruno Blanchet (INRIA) Introduction to cryptographic protocols September 2011 2 / 29 Cryptographic protocols Cryptographic protocols small programs designed to secure communication (various security goals) use cryptographic primitives (e.g. encryption, hash function, Bruno Blanchet (INRIA) Introduction to cryptographic protocols September 2011 2 / 29 Security properties (1) Secrecy: May an intruder learn some secret message between two honest participants? Authentication: Is the agent Alice really talking to Bob? Fairness: Alice and Bob want to sign a contract. Alice initiates the protocol. May Bob obtain some advantage? Non-repudiation: Alice sends a message to Bob. Alice cannot later deny having sent this message. Bob cannot deny having received the message. ... Bruno Blanchet (INRIA) Introduction to cryptographic protocols September 2011 3 / 29

  • private key

  • protocols has

  • can intercept all

  • security properties

  • encryption

  • can generate

  • public key

  • encryption decryption

  • alice initiates


Voir plus Voir moins
IntroductiontocryptographicprotocolsBrunoBlanchetINRIA,ÉcoleNormaleSupérieure,CNRSblanchet@di.ens.frSeptember2011(PartlybasedonslidesbyStéphanieDelaune)BrunoBlanchet(INRIA)IntroductiontocryptographicprotocolsSeptember20111/29CryptographicprotocolsCryptographicprotocolssmallprogramsdesignedtosecurecommunication(varioussecuritygoals)usecryptographicprimitives(e.g.encryption,hashfunction,BrunoBlanchet(INRIA)IntroductiontocryptographicprotocolsSeptember20112/29CryptographicprotocolsCryptographicprotocolssmallprogramsdesignedtosecurecommunication(varioussecuritygoals)usecryptographicprimitives(e.g.encryption,hashfunction,BrunoBlanchet(INRIA)IntroductiontocryptographicprotocolsSeptember20112/29Securityproperties(1)Secrecy:Mayanintruderlearnsomesecretmessagebetweentwohonestparticipants?Authentication:IstheagentAlicereallytalkingtoBob?Fairness:AliceandBobwanttosignacontract.Aliceinitiatestheprotocol.MayBobobtainsomeadvantage?Non-repudiation:AlicesendsamessagetoBob.Alicecannotlaterdenyhavingsentthismessage.Bobcannotdenyhavingreceivedthemessage....BrunoBlanchet(INRIA)IntroductiontocryptographicprotocolsSeptember20113/29
Un pour Un
Permettre à tous d'accéder à la lecture
Pour chaque accès à la bibliothèque, YouScribe donne un accès à une personne dans le besoin