Professional Documents
Culture Documents
Security
Security
Security services
- confidentiality: only authorized parties have read access to
information
- integrity: only authorized parties have write access to
information
- availability: authorized access to information when needed
- authenticity: identity claims (user, message source) can be
verified
- non-repudiation: message exchange can be proved by
sender and receiver
- authorization: information / system / resource access
control
Secret-key cryptography
Public-key cryptography
Encryption modes
Electronic
Code Book
mode (ECB)
Output
Feedback
mode (OFB)
Hash function
Signature
What is CSP?
Recursion
a.na
{a.kab}ServerKey(b).{nb}kab
Once again, the Commit signal must occur at the very end of the run of the protocol, although, this time the
Running event may occur right after the first signal, since the two events must only agree on the nonces, given
that na is available after the first message is sent, while nb is picked by the responder. As a consequence of such a
situation, a has a weaker authentication than b, in the sense that the protocol does not provide any guarantees
to a that b will ever obtains the key, and so authentication does not rely upon concordance of the cryptographic
key.
Initiator(a,na) = Responder(b,nb) =
env?b:Agent send.a.b.a.na receive.a.b.a.na
receive.J .a.{b.k ab .na .nb }ServerKey( a ) .m [] signal .Running _ Responder .b.a.na .nb
[]
kKey
kKey
send .a.b.m.{nb }kab nNonces send .b.J .b.{a.na .nb }ServerKey(b )
nNonces mT receive.a.b.{a.k }
signal .Commit _ Initiator.a.b.na .nb .k ab ab ServerKey ( b ) .{nb }k ab
mT
Session (a, b, k , n , n ) Session (a, b, k , n , n )
ab a b ab a b
Non-repudiation
It satisfies the need of sending and receiving messages providing
the parties involved with evidence so that neither of them can
successfully deny at a later time that the communication has
effectively taken place as agreed.
A = {a.x | a € Anonusers}