Handbook of Applied Cryptography - chap12

Chia sẻ: Van Kent Kent | Ngày: | Loại File: PDF | Số trang:54

lượt xem

Handbook of Applied Cryptography - chap12

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

This chapter considers key establishment protocols and related cryptographic techniques which provide shared secrets between two or more parties, typically for subsequent use as symmetric keys for a variety of cryptographic purposes including encryption, message authentication, and entity authentication. The main focus is two-party key establishment, with the aid of a trusted third party in some cases. While many concepts extend naturally to multi-party key establishment including conference keying protocols, such protocols rapidly become more complex, and are considered here only briefly, as is the related area of secret sharing. Broader aspects of key management, including distribution of public keys, certificates, and key life cycle issues, are deferred...

Chủ đề:

Nội dung Text: Handbook of Applied Cryptography - chap12

Đồng bộ tài khoản