© 2014

Symmetric Cryptographic Protocols


Table of contents

  1. Front Matter
    Pages i-xvii
  2. Mahalingam Ramkumar
    Pages 1-10
  3. Mahalingam Ramkumar
    Pages 11-17
  4. Mahalingam Ramkumar
    Pages 19-29
  5. Mahalingam Ramkumar
    Pages 31-62
  6. Mahalingam Ramkumar
    Pages 63-80
  7. Mahalingam Ramkumar
    Pages 81-101
  8. Mahalingam Ramkumar
    Pages 103-133
  9. Mahalingam Ramkumar
    Pages 135-162
  10. Mahalingam Ramkumar
    Pages 163-193
  11. Mahalingam Ramkumar
    Pages 195-222
  12. Mahalingam Ramkumar
    Pages 223-225
  13. Back Matter
    Pages 227-234

About this book


This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.


•        Provides detailed coverage of symmetric key protocols

•        Describes various applications of symmetric building blocks

•        Includes strategies for constructing compact and efficient digests of dynamic databases


Authenticated Data Structures Hash Chain Hash Tree Merkle Tree Multicast Security Ordered Merkle Tree Probabilistic Key Distribution Random Key Distribution Symmetric Cryptography Applications Unicast Security

Authors and affiliations

  1. 1.Mississippi State UniversityMississippi StateUSA

About the authors

Dr. Ramkumar is an Associate Professor, at the Dept. of CSE, MSU since August 2009.

Bibliographic information

Industry Sectors
IT & Software
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences


From the book reviews:

“Experienced security practitioners and cryptography researchers will benefit from reading this book. … the book provides a thorough analysis of key distribution and predistribution techniques, alongside pertinent applications. I would recommend this book as an advanced-level resource on symmetric cryptography and its application to diverse application scenarios.” (Zubair Baig, Computing Reviews, February, 2015)