Show simple item record

dc.contributor.authorChristianson, B.
dc.date.accessioned2011-09-14T11:01:05Z
dc.date.available2011-09-14T11:01:05Z
dc.date.issued2011
dc.identifier.citationChristianson , B 2011 , ' Security protocol deployment risk : (transcript of discussion) ' , Lecture Notes in Computer Science (LNCS) , vol. 6615 , pp. 21-24 . https://doi.org/10.1007/978-3-642-22137-8_4
dc.identifier.issn0302-9743
dc.identifier.otherORCID: /0000-0002-3777-7476/work/76728431
dc.identifier.urihttp://hdl.handle.net/2299/6428
dc.descriptionThe original publication is available at www.springerlink.com Copyright Springer [Full text of this transcript is not available in the UHRA]
dc.description.abstractThe level of confidence you need in the secrecy of the key you are using to upload your initials to the high score on Tour of Duty is probably different to the confidence you need to do a multi-million pound transaction. So the basic idea of this model is to classify cryptographic key sensitivity in terms of some sort of partial order: authentication master keys are more sensitive than the keys that they're used to protect; and generally a session key that is encrypted under a long term key is less sensitive than the long term key that's being used to encrypt it. If you've got the higher one, then it's possible to obtain the lower one, simply by looking at what's gone through the protocol. For example, if your protocol has got a message like that in it, then this key is below this one in the partial order.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.subjectcryptographic key
dc.subjectmaster key
dc.subjectpartial order
dc.subjectsecurity protocols
dc.subjectsession key
dc.titleSecurity protocol deployment risk : (transcript of discussion)en
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1007/978-3-642-22137-8_4
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record