Seminar Kryptographische Protokolle SS 2008 | ||
Inhalt | Vortragsthemen | Literatur | Hinweise |
Das Seminar stützt sich in Teilen auf das Buch:
[S06] William Stallings: Cryptography and Network Security - Principles and Practice
4. Auflage, 2006. Prentice Hall.
Literatur zu den einzelnen Themen:
- [S06] Kapitel 9: Public-Key Cryptography and RSA
(zusätzlich Kapitel 8: Introduction to Number Theory) - [S06] Kapitel 5: Advanced Encryption Standard
- Phil Zimmermann: The Official PGP User's Guide.
MIT Press, 1995.
[S06] Abschnitt 15.1: Pretty Good Privacy - Jozef Gruska: Quantum Computing, 1999. McGraw-Hill. Kapitel 1 & 6
- [S06] Kapitel 13: Digital Signatures and Authentication Protocols
- M. Steiner, G. Tsudik and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8):769-780, 2000. PDF
- G. Lowe. An attack on the Needham-Schroeder public-key
authentication protocol. Information Processing Letters,
56:131--133, 1995.
PS
G. Lowe: A Family of Attacks upon Authentication Protocols. Department of Mathematics and Computer Science, University of Leicester, 1997. PS
G. Lowe: Some New Attacks upon Security Protocols. Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996. PS
Tzonelih Hwang, Yung-Hsiang Chen: On the security of SPLICE/AS - The authentication system in WIDE Internet. Information Processing Letters 53, 1995. - Wie bei 7.
- D. Dolev, S. Even and R. M. Karp. On the security of ping-pong protocols. Information and Control 55:57-68, 1982. PDF
- P. Maggi and R. Sisto: Using SPIN to verify security properties of
cryptographic protocols. SPIN workshop 2002
- Michael Burrows, Martin Abadi, Roger Needham: A Logic of Authentication, Digital Equipment Corporation, 1989, 1990. PDF
- Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, p. 82-96, IEEE, 2001. PDF
- M. Abadi and A. D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. Fourth ACM Conference on Computer and Communications Security p. 36-47, 1997, ACM Press. PS
- David Monniaux. Abstracting cryptographic protocols with tree automata. SAS'99. LNCS 1694, pp. 149-163. PDF
Literatur zu den noch nicht vergebenen Themen: