Security Models and Proofs for Key Establishment Protocols

dc.contributor.authorNg, Eddie M.en
dc.date.accessioned2006-08-22T14:20:57Z
dc.date.available2006-08-22T14:20:57Z
dc.date.issued2005en
dc.date.submitted2005en
dc.description.abstractIn this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of a key establishment protocol was justified if it could be shown to withstand popular attack scenarios by heuristic analysis. Since this approach does not account for all possible attacks, the security guarantees are limited and often insufficient. This thesis examines the provable security approach to the analysis of key establishment protocols. We present the security models and definitions developed in 2001 and 2002 by Canetti and Krawczyk, critique the appropriateness of the models, and provide several security proofs under the definitions. In addition, we consider the importance of the key compromise impersonation resilience property in the context of these models. We list some open problems that were encountered in the study.en
dc.formatapplication/pdfen
dc.format.extent503090 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10012/1072
dc.language.isoenen
dc.pendingfalseen
dc.publisherUniversity of Waterlooen
dc.rightsCopyright: 2005, Ng, Eddie M.. All rights reserved.en
dc.subjectMathematicsen
dc.titleSecurity Models and Proofs for Key Establishment Protocolsen
dc.typeMaster Thesisen
uws-etd.degreeMaster of Mathematicsen
uws-etd.degree.departmentCombinatorics and Optimizationen
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
emng2005.pdf
Size:
491.3 KB
Format:
Adobe Portable Document Format