SLIDE 1
Cryptographic protocols: design and analysis
David Wagner University of California, Berkeley
1
Cryptographic protocols: design and analysis David Wagner - - PowerPoint PPT Presentation
Cryptographic protocols: design and analysis David Wagner University of California, Berkeley 1 Notation A, B, C, S : names of legitimate parties. (Short for: Alice, Bob, client, server.) M : name of a malicious attacker. (Short for: Mallet.)
1
2
3
4
A
5
A }KB
6
A }KB
A
A }KC
7
8
A }kAB
9
A }kAB
10
A }kAB
A
A }kAB 11
A
A .
A }kAB
12
AB, {data}k
13
A
14
A
15
A
M
16
17
18
19
20
21
22
23
24
25