Crypto U9, Cryptographic Protocols

jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko almost 7 years ago
97
10

Description

IYM002 (Unit 9 - cryptographic protocols) Mind Map on Crypto U9, Cryptographic Protocols, created by jjanesko on 04/24/2013.

Resource summary

Crypto U9, Cryptographic Protocols
1 specification of all events needed in order to achieve a requried security goal
1.1 specifies 4 things
1.1.1 protocol assumptions
1.1.2 protocol flow
1.1.2.1 communication steps in protocol
1.1.3 protocol messages
1.1.3.1 kind of content in messages
1.1.4 protocol actions
1.1.4.1 any action an entity needs to perform before sending or after receiving a message
2 stages of protocol design
2.1 1. define protocol objectives
2.1.1 Identify the problem trying to be solved.
2.2 2. define protocol goals
2.2.1 translate objectives into concrete security goals
2.3 3. specify protocol
2.3.1 take goals as input and determine
2.3.1.1 cryptographic primitives
2.3.1.2 flow
2.3.1.3 actions
3 design challenges
3.1 it's hard to get the right objectives
3.2 it is not always straightforward to identify the right security goals for identified objectives
3.3 deviating from standard protocols can lead to insecure protocols
3.4 complicated design goals may not fit existing, standard protocols
3.5 modifying a standard protocol even slightly may have insecure impacts
3.6 hire professionals to do protocol design
4 protocol examples
4.1 PKCS
4.1.1 specifies suite of protocols for public key cryptography
4.2 ISO / IEC 117700
4.2.1 specifies suite of protocols for mutual entity authentication
4.3 SSL/TLS
4.3.1 specifies protocol for setting up a secure communication channel
5 attacks on protocols
5.1 reflection
5.1.1 http://en.wikipedia.org/wiki/Reflection_attack
5.2 man in the middle
5.2.1 http://en.wikipedia.org/wiki/Man-in-the-middle_attack
5.3 interleaving
5.3.1 type of man in the middle attack
Show full summary Hide full summary

Similar

Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
jjanesko
Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Stream Cipher
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U8, example dynamic password scheme
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko