Back to Results
First PageMeta Content
Diffie–Hellman key exchange / Public-key cryptography / Key exchange / Shared secret / Man-in-the-middle attack / Interlock protocol / Cryptography / Cryptographic protocols / Off-the-Record Messaging


Finite-State Security Analysis of OTR Version 2 Joseph Bonneau
Add to Reading List

Document Date: 2006-03-21 17:10:20


Open Document

File Size: 104,51 KB

Share Result on Facebook

Company

AES / /

/

Event

FDA Phase / Person Communication and Meetings / /

IndustryTerm

realistic solution / public key infrastructure / possible solutions / insecure network / cryptographic protocols / data-exchange protocol / instant messaging networks / /

Organization

Stanford University Stanford / /

Person

BOB ALICE / BOB MALLORY / ALICE MALLORY BOB / Ulrich Stern / John C. Mitchell / Mark Mitchell / ALICE BOB / Ian Goldberg / Nikita Borisov / /

Position

messenger / author / Forward / /

Product

MACKm1 / /

Technology

OTR protocol / public key infrastructure / INTRODUCTION The OTR protocol / key exchange protocol / instant messaging / encryption / OTR protocols / public key / OTR AKE protocol / Record Messaging Protocol / data-exchange protocol / stream cipher / AKE protocol / /

URL

http /

SocialTag