LGW2EChapter11figures - Chapter 11 Security Protocols...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Security Protocols Chapter Figures
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Leon-Garcia/Widjaja Communication Networks Client Server Request Response r e p la y Client Imposter Server Attacker Server Figure 11.1 – part 1
Background image of page 2
Leon-Garcia/Widjaja Communication Networks Client Server Imposter Client Server Man in the middle Figure 11.1 – part 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Leon-Garcia/Widjaja Communication Networks E K (.) Key K Key K Plaintext P Ciphertext C=E K (P) P Encryption Decryption D K (.) Figure 11.2
Background image of page 4
Leon-Garcia/Widjaja Communication Networks John to Jane, “let’s talk” Receiver Sender r E k (r) E k (r´) Figure 11.3
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Leon-Garcia/Widjaja Communication Networks E K2 (.) Public key K 1 Private key K 2 Plaintext P Ciphertext C = E K1 (P) P Encryption Decryption D K2 (.) Figure 11.4
Background image of page 6
Leon-Garcia/Widjaja Communication Networks Sender Receiver E K1 (r) r John to Jane, “let’s talk” Figure 11.5
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Leon-Garcia/Widjaja Communication Networks KDC A B C D Figure 11.6
Background image of page 8
Leon-Garcia/Widjaja Communication Networks Transmitter Receiver T = g x R = g y K = R x mod p = g xy mod p K = T y mod p = g xy mod p Figure 11.7
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/11/2010 for the course ECE 547 taught by Professor Xiaojunlin during the Fall '09 term at Purdue University-West Lafayette.

Page1 / 27

LGW2EChapter11figures - Chapter 11 Security Protocols...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online