Professional Documents
Culture Documents
http:\\soict.hust.edu.vn\~vannk
Network Security
Email: vannk@soict.hust.edu.vn
Information Security by Van K Nguyen
Sep 2009 Hanoi University of Technology 2
Agenda
Basic Protocols:
Cryptographic
Key Exchange,
Protocols: basic
Authentication,
concepts
Secret Sharing
Intermediate
Advanced protocols: special
protocols: ZKP, DSs , Bit
Blind Signatures commitment and
more
Intermediate
Advanced protocols: special
protocols: ZKP, DSs , Bit
Blind Signatures commitment and
more
Otway-Rees:
Fix the replay attack to Needham-Schroeder’s
Kerberos
DASS
Denning-Sacco
Undeniable signatures
Designated confirmer signatures
Proxy Signatures
Group Signatures
Fail-Stop Digital Signatures
continues:
(3) Alice sends Bob the key.
(4) Bob decrypts the message to reveal the bit. He checks his random
string to verify the bit’s validity