Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks, Phd Thesis, Jonathan Katz

Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks, Phd Thesis, Jonathan Katz

Ratings: (0)|Views: 160|Likes:
Published by Ta Thanh Dinh

More info:

Published by: Ta Thanh Dinh on Mar 28, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/12/2014

pdf

text

original

 
Efficient Cryptographic Protocols Preventing“Man-in-the-Middle” Attacks
Jonathan KatzSubmitted in partial fulfillment of therequirements for the degreeof Doctor of Philosophyin the Graduate School of Arts and SciencesCOLUMBIA UNIVERSITY2002
 
c
2002Jonathan KatzAll Rights Reserved
 
ABSTRACTEfficient Cryptographic Protocols Preventing “Man-in-the-Middle” AttacksJonathan KatzIn the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:
passive attacks
in which an adversary eavesdrops on messages sent between honest users and
activeattacks
(i.e., “man-in-the-middle” attacks) in which — in addition to eavesdropping — the adversaryinserts, deletes, or arbitrarily modifies messages sent from one user to another. Passive attacksare well characterized (the adversary’s choices are inherently limited) and techniques for achievingsecurity against passive attacks are relatively well understood. Indeed, cryptographers have longfocused on methods for countering passive eavesdropping attacks, and much work in the 1970’s and1980’s has dealt with formalizing notions of security and providing provably-secure solutions forthis setting. On the other hand, active attacks are not well characterized and precise modeling hasbeen difficult. Few techniques exist for dealing with active attacks, and designing practical protocolssecure against such attacks remains a challenge.This dissertation considers active attacks in a variety of settings and provides new, provably-secure protocols preventing such attacks. Proofs of security are in the standard cryptographic modeland rely on well-known cryptographic assumptions. The protocols presented here are
efficient 
and
practical 
, and may find application in real-world systems.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->