Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
نویسندگان
چکیده
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the message need to be recovered. In this paper, we demonstrate how we have modeled and analyzed a new type of multiple agent based key recovery protocol. It is characterized by key encapsulation approach, protocol generalization, secret choice of key recovery agents and fork/join of session-keys by random-keys. The proposed protocol is formally modeled by a new pictorial model, an Extended Cryptographic Timed Petri Net (ECTPN). Recoverability of a session-key as well as performance of the protocol is verified by using a reachability graph of the ECTPN.
منابع مشابه
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملA New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کاملFUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR
A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...
متن کاملA Hybrid Modeling for Continuous Casting Scheduling Problem
This paper deals with a multi-agent-based interval type-2 fuzzy (IT2F) expert systemfor scheduling steel continuous casting. Continuous caster scheduling is a complex and extensiveprocess that needs expert staff. In this study, a distributed multi-agent-based structure is proposed as asolution. The agents used herein can cooperate with each other via various communication protocols.To facilitat...
متن کامل