dc.contributor.author | Christianson, B. | |
dc.date.accessioned | 2011-09-14T11:01:05Z | |
dc.date.available | 2011-09-14T11:01:05Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Christianson , B 2011 , ' Security protocol deployment risk : (transcript of discussion) ' , Lecture Notes in Computer Science (LNCS) , vol. 6615 , pp. 21-24 . https://doi.org/10.1007/978-3-642-22137-8_4 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | ORCID: /0000-0002-3777-7476/work/76728431 | |
dc.identifier.uri | http://hdl.handle.net/2299/6428 | |
dc.description | The original publication is available at www.springerlink.com Copyright Springer [Full text of this transcript is not available in the UHRA] | |
dc.description.abstract | The level of confidence you need in the secrecy of the key you are using to upload your initials to the high score on Tour of Duty is probably different to the confidence you need to do a multi-million pound transaction. So the basic idea of this model is to classify cryptographic key sensitivity in terms of some sort of partial order: authentication master keys are more sensitive than the keys that they're used to protect; and generally a session key that is encrypted under a long term key is less sensitive than the long term key that's being used to encrypt it. If you've got the higher one, then it's possible to obtain the lower one, simply by looking at what's gone through the protocol. For example, if your protocol has got a message like that in it, then this key is below this one in the partial order. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.subject | cryptographic key | |
dc.subject | master key | |
dc.subject | partial order | |
dc.subject | security protocols | |
dc.subject | session key | |
dc.title | Security protocol deployment risk : (transcript of discussion) | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/978-3-642-22137-8_4 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |