Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Public key versus symmetric key cryptography in client–server authentication protocols
by
An, Braeken
in
Authentication
/ Authentication protocols
/ Authenticity
/ Clients
/ Computer architecture
/ Cryptography
/ Privacy
/ Protocol
/ Security
/ Servers
/ Trusted third parties
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Public key versus symmetric key cryptography in client–server authentication protocols
by
An, Braeken
in
Authentication
/ Authentication protocols
/ Authenticity
/ Clients
/ Computer architecture
/ Cryptography
/ Privacy
/ Protocol
/ Security
/ Servers
/ Trusted third parties
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Public key versus symmetric key cryptography in client–server authentication protocols
Journal Article
Public key versus symmetric key cryptography in client–server authentication protocols
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Every month, several new protocols are popping up, comparing themselves with a few others and claiming to outperform the whole state of the art. The most popular domain of protocols is the one for authentication in a client–server architecture for which both symmetric key- and public key-based protocols are being proposed. The usage of public key-based mechanisms has several consequences, not only with respect to an increased computational and communication cost, but also with respect to increased possibilities to strengthen the protocol by making it resistant against a semi-trusted third party. On the other hand, we also recall that symmetric key-based protocols can already offer a nice set of security features. We see a trend in the current generation of papers published on public key-based client–server authentication protocols, showing that only a very limited amount of them really exploit the power that public key cryptography can offer with respect to this privacy towards a semi-trusted third party, and most of them do not even satisfy the same security features able to be also realised by a much more efficient symmetric key-based protocol. This paper serves as a warm wake-up call to all protocol designers to rethink the usage of more heavyweight constructions compared to symmetric key-based mechanisms in order to ensure that if they are used, they also fully exploit their inherent strength.
Publisher
Springer Nature B.V
Subject
This website uses cookies to ensure you get the best experience on our website.