Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this
0 of .
Results for:
No results containing your search query
P. 1
Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks, Phd Thesis, Jonathan Katz

Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks, Phd Thesis, Jonathan Katz

Ratings: (0)|Views: 160|Likes:
Published by Ta Thanh Dinh

More info:

Published by: Ta Thanh Dinh on Mar 28, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Efficient Cryptographic Protocols Preventing“Man-in-the-Middle” Attacks
Jonathan KatzSubmitted in partial fulfillment of therequirements for the degreeof Doctor of Philosophyin the Graduate School of Arts and SciencesCOLUMBIA UNIVERSITY2002
2002Jonathan KatzAll Rights Reserved
ABSTRACTEfficient Cryptographic Protocols Preventing “Man-in-the-Middle” AttacksJonathan KatzIn the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:
passive attacks
in which an adversary eavesdrops on messages sent between honest users and
(i.e., “man-in-the-middle” attacks) in which — in addition to eavesdropping — the adversaryinserts, deletes, or arbitrarily modifies messages sent from one user to another. Passive attacksare well characterized (the adversary’s choices are inherently limited) and techniques for achievingsecurity against passive attacks are relatively well understood. Indeed, cryptographers have longfocused on methods for countering passive eavesdropping attacks, and much work in the 1970’s and1980’s has dealt with formalizing notions of security and providing provably-secure solutions forthis setting. On the other hand, active attacks are not well characterized and precise modeling hasbeen difficult. Few techniques exist for dealing with active attacks, and designing practical protocolssecure against such attacks remains a challenge.This dissertation considers active attacks in a variety of settings and provides new, provably-secure protocols preventing such attacks. Proofs of security are in the standard cryptographic modeland rely on well-known cryptographic assumptions. The protocols presented here are
, and may find application in real-world systems.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->