Pregled bibliografske jedinice broj: 809143
Lightweight and adaptable solution for security agility
Lightweight and adaptable solution for security agility // KSII Transactions on Internet and Information Systems, 10 (2016), 3; 1212-1228 doi:10.3837/tiis.2016.03.015 (međunarodna recenzija, članak, znanstveni)
CROSBI ID: 809143 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Lightweight and adaptable solution for security agility
Autori
Vasić, Valter ; Mikuc, Miljenko ; Vuković, Marin
Izvornik
KSII Transactions on Internet and Information Systems (1976-7277) 10
(2016), 3;
1212-1228
Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni
Ključne riječi
cryptographic agility; key exchange; algorithm agreement; communication model; model verification
Sažetak
Secure communication is an important aspect of today’s interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today’s secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike i računarstva, Zagreb
Citiraj ovu publikaciju:
Časopis indeksira:
- Web of Science Core Collection (WoSCC)
- Science Citation Index Expanded (SCI-EXP)
- SCI-EXP, SSCI i/ili A&HCI
- Scopus