
|
Security Goals Authentication + Secrecy (unicast + multicast) Peer Entity , Data Origin, Implicit Destination Authn, Replay Protection Key Agreement Properties Key authentication (implicit key authentication) Key confirmation (Key Proof of Possession) Fresh Key Derivation (key freshness) “Anonymity” (aka passive user identity confidentiality) Identity Protection against Eavesdroppers Non-repudiation Proof of Origin Proof of Delivery All of them reduce to classical authentication + secrecy properties |