Содержание
- 2. Diffie-Hellman Key Exchange The Diffie-Hellman protocol allows 2 people to use random values and yet each
- 3. Alice and Bob need to agree on a key to use in a symmetric key cryptosystem.
- 4. Why Diffie-Hellman works Alice has computed k = ya mod p = (gb)a mod p =
- 5. How secure is it? We assume that cryptanalyst Charles knows the values of p and g
- 6. The Needham-Schroeder Protocol This is another protocol for exchanging keys between Alice and Bob. This time
- 7. Alice and the server have a key KAS Bob and the server have a key KBS
- 8. Alice sends the server S the names of Alice and Bob to request that a session
- 9. Alice uses key KAS to decrypt the items sent to her in step 2. Alice now
- 10. Needham-Schroeder A S: A,B 2. S A: eKAS(B, KAB, eKBS(A, KAB)) Alice decrypts to get B,
- 11. Needham-Schroeder 2 A S: A,B,NA 2. S A: eKAS(B,NA, KAB, eKBS(A, KAB)) 3. A B: eKBS(A,
- 12. Certificates A certificate consists of a public key together with an identification of the key user.
- 13. The CA guarantees the link between the user and the public key by digitally signing a
- 14. X.509 Standard Bob generates a document containing his relevant information and presents himself with this document
- 16. Скачать презентацию