Simulation in Cryptographic Protocol Design and Analysis
نویسندگان
چکیده
Security and safety were and still are a major concern for distributed computing systems and similar networks of computer environments. A number of cryptographic protocols have been proposed to achieve security and safety of network communication. There is growing interest in using computer simulation to help with understanding, analysing and designing of dynamic complex real systems. This paper studies the Agentbased simulation system on modelling the cryptographic protocols. A general formula of Agent for the simulation of cryptographic protocols has been proposed, and the dynamical environment of the simulation, which includes encryption, decryption of messages, and communication between the Agents, has been achieved by using the Java technology. The simulation system provides an approach for the designer to analyse and verify the cryptographic protocol during the design process.
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملInjecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly generate security protocols as a method of introducing heterogeneity. We present the results of simulations for the case of two party authentication protocols and argue that choosing protocols randomly out of sets numbering ...
متن کاملWhat Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis
Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptog...
متن کاملMethodical Use of Cryptographic Transformations in Authentication Protocols
Design of cryptographic protocols for authentication and key management is well known to be a diicult problem. While much research has been devoted to analysis techniques, basic design principles remain lacking. In this paper a common method of protocol design is identiied which contributes to protocol problems in a number of ways. This is the practice of encrypting all relevant elds using a re...
متن کامل