Advertisement

Key Establishment

  • Christof Paar
  • Jan Pelzl
Chapter

Abstract

With the cryptographic mechanisms that we have learned so far, in particular symmetric and asymmetric encryption, digital signatures and message authentication codes (MACs), one can relatively easily achieve the basic security services (cf. Sect. 10.1.3):

Keywords

Secure Channel Perfect Forward Secrecy Cryptographic Mechanism Pretty Good Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.Department of Electrical Engineering and Information SciencesRuhr-Universität BochumBochumGermany
  2. 2.Zentrum für IT-Sicherheitescrypt GmbH — Embedded SecurityBochumGermany

Personalised recommendations