Modeling A Secure Channel
Security definition for a secure channel try to model its properties independently from its concrete instantiation. A good understanding of these properties is needed before designing a secure channel, and before being able to assess its appropriateness of employment in a cryptographic protocol. This is a topic of provable security. A definition of a secure channel that remains secure, even when used in arbitrary cryptographic protocols is an important building block for universally composable cryptography.
A universally composable authenticated channel can be built using digital signatures and a public key infrastructure.
Universally composable confidential channels are known to exist under computational hardness assumptions based on hybrid encryption and a public key infrastructure.
Read more about this topic: Secure Channel
Famous quotes containing the words modeling, secure and/or channel:
“The computer takes up where psychoanalysis left off. It takes the ideas of a decentered self and makes it more concrete by modeling mind as a multiprocessing machine.”
—Sherry Turkle (b. 1948)
“The prosecution of [Warren] Hastings, though he should escape at last, must have good effect. It will alarm the servants of the Company in India, that they may not always plunder with impunity, but that there may be a retrospect; and it will show them that even bribes of diamonds to the Crown may not secure them from prosecution.”
—Horace Walpole (17171797)
“The Xanthus or Scamander is not a mere dry channel and bed of a mountain torrent, but fed by the ever-flowing springs of fame ... and I trust that I may be allowed to associate our muddy but much abused Concord River with the most famous in history.”
—Henry David Thoreau (18171862)