Security Protocols I - Information Security
Security Protocols I - Information Security
Security Protocols I - Information Security
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Sebastian Mödersheim 4Motivation• Example: Securing an e-banking application.A → B: “Send $10,000 to account X”B → A: “I’ll transfer it now”◮ How does B know the message originated from A?◮ How does B know A just said it?◮ Confidentiality, integrity, accountability, non-repudiation,privacy... ?Solutions involve protocols like IPSEC, KERBEROS, SSH, SSL,SET, PGP... We’ll consider underlying ideas and some exampleprotocols.FMSEC Module 2, v.2 28.09.2009