Affiliation:
1. Department of Computer Science, Częstochowa University of Technology, 42-200 Częstochowa, Poland
Abstract
Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activities during its transfer via network links. Cryptographic protocols provide such security and protection. Because of the evolution of the vulnerabilities and attackers’ methods, the cryptographic protocols should be regularly verified. This paper presents a methodology for testing the security of cryptographic protocols using the CMMTree framework. We developed and adapted a software package for analyzing cryptographic protocols regarding compatibility with the CMMTree framework using a predicate according to the approach described in Siedlecka-Lamch et al.’s works. We optimized and strengthened the mentioned approach with tree optimization methods and a lexicographic sort rule. Next, we researched the well-known security protocols using a developed tool and compared and verified the results using sorted and shuffled data. This work produced promising results. No attacks on the tested protocols were discovered.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference56 articles.
1. Cyber-physical security for IoT networks: A comprehensive review on traditional, blockchain and artificial intelligence based key-security;Attkan;Complex Intell. Syst.,2022
2. A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities;AbuAlghanam;J. Inf. Secur. Appl.,2022
3. A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network;Mo;IEEE Access,2022
4. Kubanek, M., Bobulski, J., and Karbowiak, L. (2022, January 26–28). Intelligent Identity Authentication, Using Face and Behavior Analysis. Proceedings of the Effectiveness of ICT Ethics—How Do We Help Solve Ethical Problems in the Field of ICT?—ETHICOMP, Turku, Finland.
5. Security protocols analysis including various time parameters;Szymoniak;Math. Biosci. Eng.,2021