Symmetric Cryptographic Protocols

  • Mahalingam Ramkumar

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Mahalingam Ramkumar
    Pages 1-10
  3. Mahalingam Ramkumar
    Pages 11-17
  4. Mahalingam Ramkumar
    Pages 19-29
  5. Mahalingam Ramkumar
    Pages 31-62
  6. Mahalingam Ramkumar
    Pages 63-80
  7. Mahalingam Ramkumar
    Pages 81-101
  8. Mahalingam Ramkumar
    Pages 103-133
  9. Mahalingam Ramkumar
    Pages 135-162
  10. Mahalingam Ramkumar
    Pages 163-193
  11. Mahalingam Ramkumar
    Pages 195-222
  12. Mahalingam Ramkumar
    Pages 223-225
  13. Back Matter
    Pages 227-234

About this book


This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.


•        Provides detailed coverage of symmetric key protocols

•        Describes various applications of symmetric building blocks

•        Includes strategies for constructing compact and efficient digests of dynamic databases


Authenticated Data Structures Hash Chain Hash Tree Merkle Tree Multicast Security Ordered Merkle Tree Probabilistic Key Distribution Random Key Distribution Symmetric Cryptography Applications Unicast Security

Authors and affiliations

  • Mahalingam Ramkumar
    • 1
  1. 1.Mississippi State UniversityMississippi StateUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-07583-9
  • Online ISBN 978-3-319-07584-6
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Oil, Gas & Geosciences