Simulation in Cryptographic Protocol Design and Analysis

نویسندگان

  • Ning Su
  • Richard N. Zobel
  • Frantz O. Iwu
چکیده

Security and safety were and still are a major concern for distributed computing systems and similar networks of computer environments. A number of cryptographic protocols have been proposed to achieve security and safety of network communication. There is growing interest in using computer simulation to help with understanding, analysing and designing of dynamic complex real systems. This paper studies the Agentbased simulation system on modelling the cryptographic protocols. A general formula of Agent for the simulation of cryptographic protocols has been proposed, and the dynamical environment of the simulation, which includes encryption, decryption of messages, and communication between the Agents, has been achieved by using the Java technology. The simulation system provides an approach for the designer to analyse and verify the cryptographic protocol during the design process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Injecting Heterogeneity Through Protocol Randomization

In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly generate security protocols as a method of introducing heterogeneity. We present the results of simulations for the case of two party authentication protocols and argue that choosing protocols randomly out of sets numbering ...

متن کامل

What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis

Much attention has been paid to the design of languages for the speci cation of cryptographic protocols. However, the ability to specify their desired behavior correctly is also important; indeed many perceived protocol aws arise out of a misunderstanding of the protocol's requirements. In this talk we give a brief survey of the history of requirements speci cation in formal analysis of cryptog...

متن کامل

Methodical Use of Cryptographic Transformations in Authentication Protocols

Design of cryptographic protocols for authentication and key management is well known to be a diicult problem. While much research has been devoted to analysis techniques, basic design principles remain lacking. In this paper a common method of protocol design is identiied which contributes to protocol problems in a number of ways. This is the practice of encrypting all relevant elds using a re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003