Napredna pretraga

Pregled bibliografske jedinice broj: 809143

Lightweight and adaptable solution for security agility

Vasić, Valter; Mikuc, Miljenko; Vuković, Marin
Lightweight and adaptable solution for security agility // KSII Transactions on Internet and Information Systems, 10 (2016), 3; 1212-1228 doi:10.3837/tiis.2016.03.015 (međunarodna recenzija, članak, znanstveni)

Lightweight and adaptable solution for security agility

Vasić, Valter ; Mikuc, Miljenko ; Vuković, Marin

KSII Transactions on Internet and Information Systems (1976-7277) 10 (2016), 3; 1212-1228

Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni

Ključne riječi
Cryptographic agility; key exchange; algorithm agreement; communication model; model verification

Secure communication is an important aspect of today’s interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today’s secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

Izvorni jezik

Znanstvena područja


Fakultet elektrotehnike i računarstva, Zagreb

Časopis indeksira:

  • Web of Science Core Collection (WoSCC)
    • Science Citation Index Expanded (SCI-EXP)
  • Scopus