Skip to main content

2018 | OriginalPaper | Buchkapitel

The Impact of Time Parameters on the Security Protocols Correctness

verfasst von : Sabina Szymoniak

Erschienen in: Computer Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security of computer network users is a very important aspect of the network administrators’ work. The related analysis and verification of security protocols (SP) is a key tool in the fight against access to data by unauthorized users.
This paper will present analysis and verification of timed security protocols. In order to carry out research the formal model and the computational structure presented in earlier works, were extended. Protocols’ analysis was related to the influence of time parameters on its security. The times of message encryption and decryption and delays in the network were investigated. The tests were carried out in two stages. In the first stage, the possibility to carry out generated protocols was tested. In the second stage, the execution times were analyzed for different values of time parameters. We proofed that the proper analysis and appropriately adopted time conditions make the protocol safer.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)CrossRef Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1–43 (2006)CrossRef
2.
Zurück zum Zitat Bolignano, D.: An approach to the formal verification of cryptographic protocols. In: Third ACM Conference on Computer and Communications Security, pp. 106–118. ACM Press (1996) Bolignano, D.: An approach to the formal verification of cryptographic protocols. In: Third ACM Conference on Computer and Communications Security, pp. 106–118. ACM Press (1996)
3.
Zurück zum Zitat Satyanarayanan, M.: Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7(3), 247–280 (1989)CrossRef Satyanarayanan, M.: Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7(3), 247–280 (1989)CrossRef
4.
Zurück zum Zitat Sprenger, C., Basin, D.: Refining security protocols. J. Comput. Secur. 26(1), 71–120 (2018)CrossRef Sprenger, C., Basin, D.: Refining security protocols. J. Comput. Secur. 26(1), 71–120 (2018)CrossRef
6.
Zurück zum Zitat Kurkowski, M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczających w sieciach komputerowych. Informatyka - Akademicka Oficyna Wydawnicza EXIT (2013) Kurkowski, M.: Formalne metody weryfikacji wlasnosci protokolow zabezpieczających w sieciach komputerowych. Informatyka - Akademicka Oficyna Wydawnicza EXIT (2013)
7.
Zurück zum Zitat Corin, R., Etalle, S., Hartel, P.H., Mader, A.: Timed analysis of security protocols. J. Comput. Secur. 15(6) (2007)CrossRef Corin, R., Etalle, S., Hartel, P.H., Mader, A.: Timed analysis of security protocols. J. Comput. Secur. 15(6) (2007)CrossRef
8.
Zurück zum Zitat Basin, D., Modersheim, S., Viganò, L.: Technical report no. 450 OFMC: a symbolic model-checker for security protocols (2004) Basin, D., Modersheim, S., Viganò, L.: Technical report no. 450 OFMC: a symbolic model-checker for security protocols (2004)
10.
Zurück zum Zitat Jakubowska, G., Penczek, W., Srebrny, M.: Verifying timed security protocols via translation to timed automata. In: International Workshop on Concurrency, Specification and Programming (CS&P 2002). Lecture Notes in Computer Science, pp. 100–115 (2005). Warsaw University Jakubowska, G., Penczek, W., Srebrny, M.: Verifying timed security protocols via translation to timed automata. In: International Workshop on Concurrency, Specification and Programming (CS&P 2002). Lecture Notes in Computer Science, pp. 100–115 (2005). Warsaw University
12.
Zurück zum Zitat Jakubowska, G., Penczek, W.: Modelling and checking timed authentication of security protocols. Fundam. Inform. 79(3–4), 363–378 (2007)MathSciNetMATH Jakubowska, G., Penczek, W.: Modelling and checking timed authentication of security protocols. Fundam. Inform. 79(3–4), 363–378 (2007)MathSciNetMATH
13.
Zurück zum Zitat Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef
14.
Zurück zum Zitat Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Mathe. Comput. Mech. 14(3), 127–139 (2015)CrossRef Szymoniak, S., Kurkowski, M., Piatkowski, J.: Timed models of security protocols including delays in the network. J. Appl. Mathe. Comput. Mech. 14(3), 127–139 (2015)CrossRef
15.
Zurück zum Zitat Szymoniak, S., Siedlecka-Lamch, O., Kurkowski, M.: Timed analysis of security protocols. In: Grzech, A., Świątek, J., Wilimowska, Z., Borzemski, L. (eds.) Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II. AISC, vol. 522, pp. 53–63. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46586-9_5CrossRef Szymoniak, S., Siedlecka-Lamch, O., Kurkowski, M.: Timed analysis of security protocols. In: Grzech, A., Świątek, J., Wilimowska, Z., Borzemski, L. (eds.) Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II. AISC, vol. 522, pp. 53–63. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-46586-9_​5CrossRef
16.
Zurück zum Zitat Szymoniak, S.: Analysis and simulations of timed security protocols. Studa Inf. 38(2), 55–66 (2017) Szymoniak, S.: Analysis and simulations of timed security protocols. Studa Inf. 38(2), 55–66 (2017)
Metadaten
Titel
The Impact of Time Parameters on the Security Protocols Correctness
verfasst von
Sabina Szymoniak
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92459-5_27