Friday, June 13, 2008 |
|
|
|
Key establishment - goals, security arguments and applications |
|
This talk will be an overview of key establishment. We will begin by discussing the importance of key establishment protocols and consider what a protocol needs to achieve. Then we will look at how a typical key agreement protocol would be analyzed and argued that it is secure. The last part of the talk will look at how key agreement relates to practice and what issues arise when protocols are employed in practice. |