Advertisement

Computational Security Models

  • Colin Boyd
  • Anish Mathuria
  • Douglas Stebila
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

During the early years of open academic research in cryptography it was commonplace to see research papers following a sequence of break, fix, break, fix … : a scheme would be proposed and then others would analyse it, often finding an attack. The scheme was then patched up and subjected to further scrutiny, and so the cycle would continue. Although this pattern applied to many different kinds of cryptographic schemes, it was nowhere more true than for protocols for authentication and key exchange.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Authors and Affiliations

  • Colin Boyd
    • 1
  • Anish Mathuria
    • 2
  • Douglas Stebila
    • 3
  1. 1.Department of Information Security and Communication TechnologyNorwegian University of Science and TechnologyTrondheimNorway
  2. 2.Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)GandhinagarIndia
  3. 3.Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooCanada

Personalised recommendations