Chapter 12 Contents
12 Key Establishment Protocols
12.1 Introduction
12.2 Classification and framework
12.2.1 General classification and fundamental concepts
12.2.2 Objectives and properties
12.2.3 Assumptions and adversaries in key establishment protocols
12.3 Key transport based on symmetric encryption
12.3.1 Symmetric key transport and derivation without a server
12.3.2 Kerberos and related server-based protocols
12.4 Key agreement based on symmetric techniques
12.5 Key transport based on public-key encryption
12.5.1 Key transport using PK encryption without signatures
12.5.2 Protocols combining PK encryption and signatures
12.5.3 Hybrid key transport protocols using PK encryption
12.6 Key agreement based on asymmetric techniques
12.6.1 Diffie-Hellman and related key agreement protocols
12.6.2 Implicitly-certified public keys
12.6.3 Diffie-Hellman protocols using implicitly-certified keys
12.7 Secret sharing
12.7.1 Simple shared control schemes
12.7.2 Threshold schemes
12.7.3 Generalized secret sharing
12.8 Conference keying
12.9 Analysis of key establishment protocols
12.9.1 Attack strategies and classic protocol flaws
12.9.2 Analysis objectives and methods
12.10 Notes and further references
Return to the Table of contents