11.07.2015 Views

Security Protocols I - Information Security

Security Protocols I - Information Security

Security Protocols I - Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sebastian Mödersheim 7Building a key establishment protocol (1)• An attempt to design a good protocol (from first principles).• First step: establish the communications architecture.We choose here one common scenario (among many):◮ A set of users, any 2 of whom may wish to establish a newsession key for subsequent secure communications.N.B.: successful completion of key establishment (& entity authentication)is only the beginning of a secure communications session. Furthercommunication (often also through protocols) may be based on this key.N.B. 2: Users are not necessarily honest! (More later)◮ There is an honest server.N.B.: Often called “trusted server”, but trust ≠ honesty! We assumethat an honest server never cheats and never gives out user secrets.FMSEC Module 2, v.2 28.09.2009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!