Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Lightweight and adaptable solution for security agility (CROSBI ID 226750)

Prilog u časopisu | izvorni znanstveni rad | međunarodna recenzija

Vasić, Valter ; Mikuc, Miljenko ; Vuković, Marin Lightweight and adaptable solution for security agility // Transactions on internet and information systems, 10 (2016), 3; 1212-1228. doi: 10.3837/tiis.2016.03.015

Podaci o odgovornosti

Vasić, Valter ; Mikuc, Miljenko ; Vuković, Marin

engleski

Lightweight and adaptable solution for security agility

Secure communication is an important aspect of today’s interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today’s secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

cryptographic agility; key exchange; algorithm agreement; communication model; model verification

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

10 (3)

2016.

1212-1228

objavljeno

1976-7277

2288-1468

10.3837/tiis.2016.03.015

Povezanost rada

Računarstvo

Poveznice
Indeksiranost