Understanding Cryptographic Protocols: Secure Communication Techniques π
Learn how cryptographic protocols use encryption methods to ensure secure and reliable communication. Explore key concepts and best practices in cryptography today!

World Gurukul way of Learning Values and Wisdom
3.6K views β’ Nov 3, 2017

About this video
Module19 β Cryptography, Section 19.4 β Cryptographic protocol.
Cryptographic protocol applies cryptographic methods and describes how the algorithms should be used and some aspects are:
β Key agreement or establishment
β Entity authentication
β Symmetric encryption and message authentication material construction
β Secured application-level data transport
β Non-repudiation methods
β Secret sharing methods
β Secure multi-party computation
Crypto Protocols
β’ Internet Key Exchange (IKE)
β’ IPSec (Internet Protocol Security)
β’ Kerberos
β’ Off-the-Record Messaging (OTR)
β’ Point to Point Protocol (PPP)
β’ Signal Protocol
β’ Transport Layer Security (TLS)
β’ ZRTP (Z and Real-time Transport Protocol)
TLS is a cryptographic protocol that is used to secure web (HTTP/HTTPS) connections. TLS is used in applications such as web browsing, email, Internet faxing, instant messaging, and voice-over-IP (VoIP).
The 3 aspects of TLS are:
β’ It has an entity authentication mechanism, based on the X.509 system.
β’ A key setup phase, where a symmetric encryption key is formed by employing public-key cryptography.
β’ An application-level data transport function.
Cryptographic protocols can be verified formally to identify threats and done through below models:
β’ DolevβYao model
β’ BurrowsβAbadiβNeedham logic (BAN logic)
β’ Protocol composition logic (PCL)
β’ Strand space
β’ Alice & Bob notation
Projects and tools for Security protocol verification
β AVISPA and AVANTSSAR
β Casper / FDR compiler
β CryptoVerif, ProVerif
β Cryptographic Protocol Shapes Analyzer (CPSA)
β Knowledge In Security protocolS (KISS)
β Maude-NRL Protocol Analyzer (Maude-NPA)
β Scyther
β Tamarin Prover
Cryptographic protocol applies cryptographic methods and describes how the algorithms should be used and some aspects are:
β Key agreement or establishment
β Entity authentication
β Symmetric encryption and message authentication material construction
β Secured application-level data transport
β Non-repudiation methods
β Secret sharing methods
β Secure multi-party computation
Crypto Protocols
β’ Internet Key Exchange (IKE)
β’ IPSec (Internet Protocol Security)
β’ Kerberos
β’ Off-the-Record Messaging (OTR)
β’ Point to Point Protocol (PPP)
β’ Signal Protocol
β’ Transport Layer Security (TLS)
β’ ZRTP (Z and Real-time Transport Protocol)
TLS is a cryptographic protocol that is used to secure web (HTTP/HTTPS) connections. TLS is used in applications such as web browsing, email, Internet faxing, instant messaging, and voice-over-IP (VoIP).
The 3 aspects of TLS are:
β’ It has an entity authentication mechanism, based on the X.509 system.
β’ A key setup phase, where a symmetric encryption key is formed by employing public-key cryptography.
β’ An application-level data transport function.
Cryptographic protocols can be verified formally to identify threats and done through below models:
β’ DolevβYao model
β’ BurrowsβAbadiβNeedham logic (BAN logic)
β’ Protocol composition logic (PCL)
β’ Strand space
β’ Alice & Bob notation
Projects and tools for Security protocol verification
β AVISPA and AVANTSSAR
β Casper / FDR compiler
β CryptoVerif, ProVerif
β Cryptographic Protocol Shapes Analyzer (CPSA)
β Knowledge In Security protocolS (KISS)
β Maude-NRL Protocol Analyzer (Maude-NPA)
β Scyther
β Tamarin Prover
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
3.6K
Likes
15
Duration
6:59
Published
Nov 3, 2017
User Reviews
4.0
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now