CRYPTOGRAPHIC PROTOCOL SECURITY IN NATIONAL ENCRYPTION APPLICATIONS

نویسندگان

چکیده

In the era of digital transformation, information exchange, especially confidential and strategic has become most vital aspect for almost all organizations. Various bad precedents regarding classified leaks in Indonesia have a slap face that must be acknowledge answered with effective solutions. 2020, XYZ Agency developed file encryption application (ABC Application) to address challenge securing information, those transmitted on electronic channels. Until 2022, ABC Application been implemented limited scope its implementation is planned expanded nationally. After 2 years operation, conducted study security algorithm used Application, but unfortunately not an in-depth protocol suite Application. this research, analysis suites, namely registration protocol, user verification, key generation, request encryption-decryption process was through formal verification approach using Scyther Tool. The focuses aspects guaranteeing confidentiality authentication four criteria, secrecy, aliveness, synchronization, agreement. experimental results showed these protocols meet criteria general weaknesses aspect, synchronization agreement criteria. Based weaknesses, technical recommendations are proposed able overcome identified weaknesses.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Protocol Security in the Cryptographic Model

It seems to be a generally acknowledged fact that you should never trust a computer and that you should trust the person operating the computer even less. This in particular becomes a problem when the party that you do not trust is one which is separated from you and is one on which you depend, e.g. because that party is the holder of some data or some capability that you need in order to opera...

متن کامل

Security Aspects of Fpgas in Cryptographic Applications

This contribution provides a state-of-the-art description of security issues on FPGAs from a system perspectives. We consider the potential security problems of FPGAs and propose some countermeasure for the existing drawbacks of FPGAs. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution is one of th...

متن کامل

Improving the Security of Cryptographic Protocol Standards

S ecurity protocols are distributed algorithms that use cryptography to achieve security objectives. In practice, these protocols regulate how computing devices carry out security-critical tasks. For example, Transport Layer Security (TLS) is used to establish secure communication channels between clients and servers, Kerberos is used for distributed authentication and authorization, and IPsec ...

متن کامل

Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption

We propose a set of primitives based on El Gamal encryption that can be used to construct efficient multiparty computation protocols for certain low-complexity functions. In particular, we show how to privately count the number of true Boolean disjunctions of literals and pairwise exclusive disjunctions of literals. Applications include efficient two-party protocols for computing the Hamming di...

متن کامل

Survey in Formal Analysis of Security Properties of Cryptographic Protocol

When we talk about security, we talk about something broad. If we address security assurance, there are a lot of things have to be taken into account which include system design, protocols, implementation, procedure, environment, and human behaviour as well. In other word, security conditions of a system cannot be measured only by the design, but the verification of implementation and periodic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Teknik Informatika

سال: 2023

ISSN: ['1979-9160', '2549-7901']

DOI: https://doi.org/10.52436/1.jutif.2023.4.2.744