Information Security and Cryptography Texts and Monographs Series Editors Ueli Maurer Ronald L. Rivest Associate Editors Martin Abadi Ross Anderson Mihir Bellare Oded Goldreich Tatsuaki Okamoto Paul van Oorschot Birgit Pfitzmann Aviel D. Rubin Jacques Stern Springer-Verlag Berlin Heidelberg GmbH Colin Boyd • Anish Mathuria Protocols for Authentication and Key Establishment With 12 Figures and 31 Tables . Springer .184'). .". Authors Series Editors Colin Boyd Ueli Maurer School of Software Engineering Inst. fur Theoretische Informatik and Data Communications ETH Zurich, 8092 Zurich Queensland University of Technology Switzerland GPO Box 2434, Brisbane Q4001 Australia Ronald 1. Rivest c.
[email protected] MIT, Dept. of Electrical Engineering and Computer Science 545 Technology Square, Room 324 Anish Mathuria Cambridge, MA 02139 Dhirubhai Ambani Institute USA of Information & Communication Technology Gandhinagar-382 009 Gujarat India
[email protected] Library of Congress Cataloging-in-Publication Data Boyd, Colin. Protocols for authentication and key establishment Colin A. Boyd, Anish Mathuria. p.cm. -- (Information security and cryptography) Includes bibliographical references and index. ISBN 978-3-642-07716-6 ISBN 978-3-662-09527-0 (eBook) DOI 10.1007/978-3-662-09527-0 1. Computer networks--Security measures. 2. Computer network protocols. 3. Data encryption (Computer science) 4. Public key infrastructure (computer security) I. Mathuria, Anish, 1967- II. Title. III. Series. TK5105.59.B592003 005.8' 2--dc21 2003054427 ACM Subject Classification (1998): K.6.S ISBN 978-3-642-07716-6 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfIlm or in any other way, and storage in data banks.