05 Contents
05 Contents
TABLE OF CONTENTS
ABSTRACT iii
LIST OF TABLES xi
LIST OF FIGURES xii
LIST OF ABBREVIATIONS xv
1. INTRODUCTION 1
1.1 CRYPTOGRAPHY 1
1.2 SYMMETRIC KEY CRYPTOGRAPHY 2
1.3 ASYMMETRIC KEY CRYPTOGRAPHY 3
1.4 HASH FUNCTION 5
1.5 SECURITY SERVICES 8
1.5.1 Authentication 8
1.5.2 Access control 9
1.5.3 Data confidentiality 9
1.5.4 Data Integrity 9
1.5.5 Nonrepudiation 10
1.5.6 Availability service 10
1.6 KEY EXCHANGE 10
1.6.1 Key 10
1.6.2 Key Exchange 11
1.6.3 Key Exchange Protocol 12
1.6.4 Key Management 13
1.6.5 Password authenticated Key Exchange 14
1.6.6 Encrypted Key Exchange Protocol 15
viii
1.7 ATTACKS 16
1.7.1 Active Attacks 18
1.7.2 Passive Attacks 19
1.7.3 Password guessing Attack 20
1.8 MOTIVATION 23
1.9 OBJECTIVESOF THIS STUDY 24
1.10 ORGANIZATION OF THE THESIS 24
2. LITERATURE REVIEW 25
3. RESEARCH METHODOLOGY 59
3.1 INTRODUCTION 59
3.2 ENCRYPTED KEY EXCHANGE PROTOCOL 59
3.2.1 Notations 60
3.2.2 Procedure 61
3.3 UNDETETABLE PASSWORD GUESSING
ATTACK ON EKE 68
3.4 MATHEMATICAL BACKGROUND 73
3.5 DESCRIPTION OF SYMMETRIC AND
ASYMMETRIC ENCRYPTION 76
3.5.1 Symmetric Encryption 76
3.5.2 Asymmetric Encryption 77
3.5.3 Switch Function 82
3.5.4 Encryption Function 83
3.5.5 Key generation function 86
3.5.6 Trapdoor function 91
ix
REFERENCES 151
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATIONS