Download Applied Public Key Infrastructure by J. Zhou, C. Kang, F. Bao (Editors) PDF

By J. Zhou, C. Kang, F. Bao (Editors)

Show description

Read Online or Download Applied Public Key Infrastructure PDF

Similar applied mathematicsematics books

Extra resources for Applied Public Key Infrastructure

Sample text

4] M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proceedings of Crypto’96. [5] R. Deng, L. Gong, A. Lazar and W. Wang. Practical Protocols For Certified Electronic Mail. Journal of Network and System Management, vol. 4, no. 3, 1996. [6] Y. Desmedt and Y. Frankel. CRYPTO’89. [7] C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In D. Boneh, editor, Proc. CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 426–444.

This means that the generated non-repudiation evidences are the same regardless of whether the TTP is involved or not. However, we remark that Micali’s schemes have three weaknesses. First, there are no evidences for non-repudiation of origin (NRO), but in some scenarios the receiver may need NRO to prove the message origin. Second, his schemes are inefficient if the delivered message is long, since in his schemes messages are encrypted under asymmetric instead of symmetric encryption algorithms.

0 and ran on the Java Virtual Machine. For processing incoming and outgoing emails, Java’s crypto library was used to compute any hash value or HMAC it needed, in both cases using the SHA1 algorithm. For testing, a program simulating Sendmail on each server sent valid messages to its local MAUDE. 1 library to compute the SHA1 hash value for the tuples it sent to MAUDE. This simulator measured the extra delay time MAUDE added to the delivery of an email. J. Kartaltepe and S. 4. Performance To examine the delay incurred by MAUDE on the sender’s email server, time was marked before and after each transmission over 10000 requests.

Download PDF sample

Rated 4.04 of 5 – based on 34 votes