How is a cryptographic protocol defined?
A cryptographic protocol is defined as a series of steps and message exchanges between multiple entities in order to achieve a specific security objective.
What are some general properties of a protocol?
* Additional property of a cryptographic protocol:
What are some applications of Cryptographic Protocols?
Explain some concerns about the Diffie-Hellman (cryptographic protocol) for key exchange:
How does PFS (Perfect Forward Secrecy) takes place?
What is Data Origin Authentication?
Data origin authentication is the security service that enables entities to verify that a message has been originated by a particular entity and that it has not been altered afterwards.
Also called: data integrity.
What is the relation of data integrity to cryptographic protocols?
What is Entity Authentication?
How can Entity Authentication be accomplished?
Why entity authentication is more than an exchange of (data-origin) authentic messages?
What 2 means can be used to ensure timeliness in cryptographic protocols?
Most authentication protocols do also establish a secret session key for securing the current session following the authentication exchange.
What are the two main categories of protocols for entity authentication?
Describe the advantages and drawbacks of Arbitrated authentication:
Describe the advantages and drawbacks of Direct authentication:
Describe the meaning of some notation of Cryptographic Protocols (1):
Describe the meaning of some notation of Cryptographic Protocols (2):
Describe and elaborate on the Needham-Schroeder Protocol:
Elaborate on the security discussion of the Needham-Schroeder Protocol:
Explain how the Otway-Rees Protocol works:
Elaborate on the security discussion of the Otway-Rees protocol:
What is Kerberos and what are its key characteristics?
How does Kerberos (v4) works? Describe its steps:
Graphically explain and elaborate on how Kerberos work:

How does Multiple Domain Kerberos works?