44,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol…mehr

Produktbeschreibung
Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged.
Autorenporträt
Astha Keshariya, PHD, MCA [Hons] has consulted several commercial and academic organizations in the field of applied Cryptography and Information Security. She has worked on many projects like implementation of algorithms like RSA for financial transactions, mitigations of DDOS attacks and optimizing the cryptographic modes of operations.