|
|
1 | (10) |
|
1.1 Cryptographic Algorithms |
|
|
1 | (3) |
|
1.1.1 Symmetric Cryptographic Algorithms |
|
|
2 | (1) |
|
1.1.2 Asymmetric Algorithms |
|
|
3 | (1) |
|
1.2 Using Cryptographic Algorithms |
|
|
4 | (3) |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.2.3 Hashed Message Authentication Code |
|
|
6 | (1) |
|
1.2.4 Asymmetric Encryption and Signatures |
|
|
6 | (1) |
|
1.3 Cryptographic Protocols and Security Protocols |
|
|
7 | (4) |
|
|
7 | (1) |
|
1.3.2 Symmetric Protocols |
|
|
8 | (1) |
|
1.3.3 Symmetric Security Protocols |
|
|
9 | (2) |
|
2 Some Useful Constructions |
|
|
11 | (8) |
|
|
11 | (4) |
|
|
12 | (1) |
|
|
12 | (3) |
|
|
15 | (4) |
|
|
15 | (1) |
|
|
16 | (3) |
|
3 Nonscalable Key Distribution Schemes |
|
|
19 | (12) |
|
|
20 | (2) |
|
|
20 | (1) |
|
3.1.2 Leighton--Micali Protocol |
|
|
20 | (2) |
|
|
22 | (1) |
|
3.2.1 Basic KDS for Static Small-Scale Networks |
|
|
22 | (1) |
|
3.2.2 Key Distribution for Dynamic Networks |
|
|
23 | (1) |
|
|
23 | (3) |
|
3.3.1 Identity Ticket (IT) Scheme |
|
|
25 | (1) |
|
|
26 | (5) |
|
3.4.1 MLS with Multiple KDCs |
|
|
27 | (1) |
|
|
28 | (3) |
|
4 MLS for Internet Security Protocols |
|
|
31 | (32) |
|
|
31 | (3) |
|
|
32 | (2) |
|
|
34 | (2) |
|
4.2.1 Link-Security Approaches |
|
|
35 | (1) |
|
|
36 | (2) |
|
4.3.1 Authenticated Denial |
|
|
36 | (1) |
|
|
37 | (1) |
|
4.4 MLS Based Alternative to DNSSEC |
|
|
38 | (6) |
|
4.4.1 Extending Link-Security Approaches |
|
|
38 | (1) |
|
4.4.2 Principle of TCB-DNS |
|
|
39 | (3) |
|
4.4.3 Computing Link Secrets |
|
|
42 | (2) |
|
|
44 | (7) |
|
4.5.1 The Atomic Relay Algorithm |
|
|
44 | (2) |
|
4.5.2 Preparation of TCB-DNS Master File |
|
|
46 | (1) |
|
4.5.3 Verification of RRSets |
|
|
47 | (3) |
|
4.5.4 Proof of Correctness |
|
|
50 | (1) |
|
4.6 Practical Considerations |
|
|
51 | (7) |
|
|
52 | (1) |
|
4.6.2 Authenticated Denial |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (5) |
|
|
59 | (1) |
|
|
60 | (1) |
|
4.7.3 IPSec Alternative Leveraging TCB-DNS |
|
|
60 | (3) |
|
5 Scalable Key Distribution Schemes |
|
|
63 | (18) |
|
5.1 Certificates Based Schemes |
|
|
63 | (1) |
|
5.2 Identity Based Schemes |
|
|
64 | (3) |
|
5.2.1 Identity-Based Key Predistribution Schemes |
|
|
64 | (1) |
|
|
65 | (2) |
|
5.3 Probabilistic KPSs (PKPS) |
|
|
67 | (4) |
|
5.3.1 Allocation of Subsets |
|
|
67 | (1) |
|
5.3.2 Random Preloaded Subsets |
|
|
68 | (1) |
|
|
68 | (2) |
|
5.3.4 Hashed Random Preloaded Subsets (HARPS) |
|
|
70 | (1) |
|
5.4 (n, p)-Security of HARPS |
|
|
71 | (4) |
|
5.4.1 Probability of Winning a Round |
|
|
72 | (1) |
|
5.4.2 Optimization of Parameters |
|
|
73 | (2) |
|
5.5 Deterministic Versus Probabilistic KPSs |
|
|
75 | (6) |
|
|
77 | (1) |
|
5.5.2 Complexity Versus Desired Collusion Resistance n |
|
|
78 | (1) |
|
5.5.3 Using External Resources |
|
|
78 | (1) |
|
5.5.4 Low Complexity Hardware |
|
|
79 | (1) |
|
5.5.5 Multiple KDCs and Renewal |
|
|
79 | (1) |
|
5.5.6 Exploiting Multi-path Diversity |
|
|
80 | (1) |
|
|
80 | (1) |
|
6 Scalable Extensions of Nonscalable Schemes |
|
|
81 | (22) |
|
|
81 | (1) |
|
6.2 Parallel Leighton--Micali Scheme (PLM) |
|
|
82 | (2) |
|
6.3 (n, p)-Security of PBK and PLM |
|
|
84 | (1) |
|
6.3.1 Optimal Choice of Parameters m and M |
|
|
84 | (1) |
|
6.4 Subset Keys and Identity Tickets (SKIT) |
|
|
85 | (2) |
|
6.4.1 (n, p)-Security of SKIT |
|
|
86 | (1) |
|
6.4.2 Optimal Choice of Parameters |
|
|
87 | (1) |
|
|
87 | (3) |
|
6.6 Beyond (n, p)-Security |
|
|
90 | (6) |
|
6.6.1 (n, φ, pa)-Security of RPS |
|
|
91 | (2) |
|
6.6.2 (n, φ, pa)-Security of PBK/PLM |
|
|
93 | (2) |
|
6.6.3 (n, φ, pa)-Security of SKIT |
|
|
95 | (1) |
|
6.6.4 Addressing Message Injection Attacks |
|
|
95 | (1) |
|
6.7 PLM for Sensor Networks |
|
|
96 | (5) |
|
6.7.1 Classical Sensor Network Model |
|
|
97 | (1) |
|
|
97 | (1) |
|
6.7.3 Key Distribution for Sensor Networks |
|
|
98 | (1) |
|
|
99 | (1) |
|
6.7.5 Performance and Overhead |
|
|
100 | (1) |
|
|
101 | (2) |
|
7 Using PKPSs with Tamper-Responsive Modules |
|
|
103 | (32) |
|
|
103 | (4) |
|
7.1.1 Active and Passive Shields |
|
|
104 | (1) |
|
|
105 | (2) |
|
7.1.3 Single-Step Countermeasures |
|
|
107 | (1) |
|
|
107 | (7) |
|
7.2.1 DOWN-Enabled Modules |
|
|
108 | (1) |
|
7.2.2 DOWN with Other Asymmetric Schemes |
|
|
109 | (2) |
|
7.2.3 DOWN With ID-Based Schemes |
|
|
111 | (2) |
|
7.2.4 DOWN Assurance and Complexity |
|
|
113 | (1) |
|
|
114 | (1) |
|
7.3 A Second Look at Key Predistribution Scheme (KPS) Complexity |
|
|
114 | (3) |
|
7.3.1 Generic Device Model |
|
|
115 | (2) |
|
|
117 | (7) |
|
7.4.1 Deployment Complexity |
|
|
117 | (3) |
|
7.4.2 Complexity During Regular Operation |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (3) |
|
|
126 | (1) |
|
|
126 | (1) |
|
7.6 Security Protocols Utilizing fpw() |
|
|
127 | (6) |
|
7.6.1 Atomic Relay Protocols |
|
|
128 | (1) |
|
7.6.2 Atomic Authentication Relay Algorithm |
|
|
128 | (2) |
|
7.6.3 Atomic Path Secret Relay Algorithm |
|
|
130 | (1) |
|
|
131 | (2) |
|
|
133 | (2) |
|
8 Broadcast Authentication and Broadcast Encryption |
|
|
135 | (28) |
|
8.1 Certificates-Based Broadcast Authentication (BA) |
|
|
135 | (3) |
|
8.1.1 One-Time Signatures (OTS) |
|
|
135 | (2) |
|
8.1.2 Timed Efficient Stream Loss Tolerant Authentication (TESLA) |
|
|
137 | (1) |
|
8.2 Identity-Based Broadcast Authentication (BA) Using Key Predistribution |
|
|
138 | (4) |
|
8.2.1 Reducing Signature Size |
|
|
139 | (2) |
|
8.2.2 Effect of Decrypt Only When Necessary (DOWN) Assurance |
|
|
141 | (1) |
|
|
142 | (3) |
|
8.3.1 Tree-Based Broadcast Encryption (BE) Schemes |
|
|
142 | (2) |
|
8.3.2 Broadcast Encryption (BE) Using Probabilistic Key Distribution |
|
|
144 | (1) |
|
8.3.3 Broadcast Encryption (BE) by Sources Other Than Key Distribution Center (KDC) |
|
|
145 | (1) |
|
8.4 Performance of Probabilistic Key Predistribution Scheme Broadcast Encryption (PKPS BE) |
|
|
145 | (7) |
|
|
147 | (1) |
|
8.4.2 Over-Provisioning Keys |
|
|
148 | (1) |
|
8.4.3 Hashed Random Preloaded Subsets (HARPS) vs. Random Preloaded Subsets (RPS) |
|
|
149 | (3) |
|
8.5 Models for Broadcast Encryption (BE) |
|
|
152 | (5) |
|
|
152 | (1) |
|
|
153 | (2) |
|
8.5.3 Batch Sizes for External Sources |
|
|
155 | (2) |
|
8.6 Application of Probabilistic Key Predistribution Scheme Broadcast Encryption (PKPS BE) in Publish--Subscribe Systems |
|
|
157 | (6) |
|
|
157 | (1) |
|
8.6.2 PKPS-BE vs. T-BE for Pub--Sub Systems |
|
|
158 | (2) |
|
|
160 | (3) |
|
9 Authenticated Data Structures |
|
|
163 | (32) |
|
9.1 Merkle Tree as an ADS |
|
|
164 | (3) |
|
9.1.1 Merkle Tree Protocols |
|
|
165 | (2) |
|
|
167 | (10) |
|
|
167 | (2) |
|
|
169 | (1) |
|
9.2.3 Verification and Update Protocols |
|
|
170 | (1) |
|
9.2.4 Insertion of OMT Leaves |
|
|
171 | (2) |
|
9.2.5 Reordering OMT Leaves |
|
|
173 | (1) |
|
9.2.6 Index Ordered Merkle Tree |
|
|
174 | (1) |
|
9.2.7 Domain Ordered Merkle Tree |
|
|
175 | (1) |
|
9.2.8 Summary of OMT Properties |
|
|
176 | (1) |
|
9.3 OMT Algorithms in Trusted Resource Limited Boundaries |
|
|
177 | (14) |
|
|
178 | (1) |
|
|
179 | (1) |
|
9.3.3 OMT Functions Exposed by T |
|
|
180 | (3) |
|
9.3.4 Root Equivalence Certificates |
|
|
183 | (3) |
|
|
186 | (2) |
|
9.3.6 Using Module Functions |
|
|
188 | (1) |
|
9.3.7 Context/Application Dependent Functions |
|
|
189 | (2) |
|
9.4 Infrastructural Requirements |
|
|
191 | (4) |
|
10 Universal Trusted Computing Bases |
|
|
195 | (28) |
|
|
195 | (3) |
|
10.1.1 Complexity and Ignorance |
|
|
195 | (2) |
|
10.1.2 System Security Model |
|
|
197 | (1) |
|
10.2 Trusted Platform Modules |
|
|
198 | (2) |
|
10.2.1 Realizing a TCG Trusted Platform |
|
|
198 | (1) |
|
10.2.2 Pitfalls of the TCG Approach |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
202 | (1) |
|
10.4 Credential Management Modules |
|
|
203 | (9) |
|
10.4.1 Credential Transaction Model |
|
|
204 | (3) |
|
10.4.2 Consequential Transactions |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
10.4.5 CMM State and VN State |
|
|
209 | (1) |
|
|
210 | (1) |
|
10.4.7 CMMs as ADS Constructors and Verifiers |
|
|
211 | (1) |
|
10.5 CMM System Architecture |
|
|
212 | (4) |
|
|
213 | (1) |
|
10.5.2 Creation of Virtual Networks |
|
|
213 | (2) |
|
10.5.3 Intra-VN Key Distribution |
|
|
215 | (1) |
|
|
215 | (1) |
|
10.6 Credential Transaction Model of Representative Systems |
|
|
216 | (7) |
|
10.6.1 Credential Transaction Model for DNS |
|
|
217 | (2) |
|
|
219 | (2) |
|
10.6.3 Transaction Models for Other Systems |
|
|
221 | (2) |
|
|
223 | (4) |
References |
|
227 | (6) |
Index |
|
233 | |