Chapter 12 Contents
12 Key Establishment Protocols
12.1 Introduction
12.2 Classification and framework12.2.1 General classification and fundamental concepts 12.2.2 Objectives and properties 12.2.3 Assumptions and adversaries in key establishment protocols
12.3 Key transport based on symmetric encryption12.3.1 Symmetric key transport and derivation without a server 12.3.2 Kerberos and related server-based protocols
12.4 Key agreement based on symmetric techniques
12.5 Key transport based on public-key encryption12.5.1 Key transport using PK encryption without signatures 12.5.2 Protocols combining PK encryption and signatures 12.5.3 Hybrid key transport protocols using PK encryption
12.6 Key agreement based on asymmetric techniques12.6.1 Diffie-Hellman and related key agreement protocols 12.6.2 Implicitly-certified public keys 12.6.3 Diffie-Hellman protocols using implicitly-certified keys
12.7 Secret sharing12.7.1 Simple shared control schemes 12.7.2 Threshold schemes 12.7.3 Generalized secret sharing
12.8 Conference keying
12.9 Analysis of key establishment protocols12.9.1 Attack strategies and classic protocol flaws 12.9.2 Analysis objectives and methods
12.10 Notes and further references
Return to the Table of contents