11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 32Summary: Messages• Message notation (examples):Roles: A, B or Alice, BobAgents: a, b, iSymmetric Keys: K, K AB , . . . ; sk(A, S)Symmetric Encryption: {|M|} KPublic Keys: K, pk(A)Private Keys: inv(K), inv(pk(A))Asymmetric Encryption: {M} KSigning: {M} inv(K)Nonces: NA, N1 fresh data items used for challenge/response.N.B.: sometimes subscripts are used, e.g. N A , but it does not mean thatprincipals can find out that N A was generated by A.Timestamps: T . Denote time, e.g. used for key expiration.Message concatenation: M 1 , M 2 , M 3FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!