Graphical representation of attacks on security protocol

In a digital age, cryptographic security protocols are extremely important in ensuring a secure communication in an open network. Many research has arise in the field of protocol design and verification. However, verification of protocol can be extremely difficult to be done manually. With massive a...

Full description

Bibliographic Details
Main Author: Wang, Jianfang
Other Authors: Alwen Fernanto Tiu
Format: Final Year Project (FYP)
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/66777
_version_ 1826116029599711232
author Wang, Jianfang
author2 Alwen Fernanto Tiu
author_facet Alwen Fernanto Tiu
Wang, Jianfang
author_sort Wang, Jianfang
collection NTU
description In a digital age, cryptographic security protocols are extremely important in ensuring a secure communication in an open network. Many research has arise in the field of protocol design and verification. However, verification of protocol can be extremely difficult to be done manually. With massive amount of protocol begin design it make the verification more difficult. Thus, automate verification tools such as Proverif is developed to aid, the verification process. But Proverif output maybe can be very complex for a new user to understand. In this project, its aim to aid the new user in understanding the output of Proverif through the conversion of output text to graphical representation. The protocol notation was use to convert to Proverif output, this result is then parse and generate into graphical representation. The graphical representation generate from output text may not be exactly match to the claimed attack of example protocol. But it is able to provide user an addition perspective of the attack, and ease the message tracing and back tracing while understanding the output.
first_indexed 2024-10-01T04:04:43Z
format Final Year Project (FYP)
id ntu-10356/66777
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:04:43Z
publishDate 2016
record_format dspace
spelling ntu-10356/667772023-03-03T20:54:46Z Graphical representation of attacks on security protocol Wang, Jianfang Alwen Fernanto Tiu School of Computer Engineering DRNTU::Engineering::Computer science and engineering In a digital age, cryptographic security protocols are extremely important in ensuring a secure communication in an open network. Many research has arise in the field of protocol design and verification. However, verification of protocol can be extremely difficult to be done manually. With massive amount of protocol begin design it make the verification more difficult. Thus, automate verification tools such as Proverif is developed to aid, the verification process. But Proverif output maybe can be very complex for a new user to understand. In this project, its aim to aid the new user in understanding the output of Proverif through the conversion of output text to graphical representation. The protocol notation was use to convert to Proverif output, this result is then parse and generate into graphical representation. The graphical representation generate from output text may not be exactly match to the claimed attack of example protocol. But it is able to provide user an addition perspective of the attack, and ease the message tracing and back tracing while understanding the output. Bachelor of Engineering (Computer Science) 2016-04-26T02:26:48Z 2016-04-26T02:26:48Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/66777 en Nanyang Technological University 43 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering
Wang, Jianfang
Graphical representation of attacks on security protocol
title Graphical representation of attacks on security protocol
title_full Graphical representation of attacks on security protocol
title_fullStr Graphical representation of attacks on security protocol
title_full_unstemmed Graphical representation of attacks on security protocol
title_short Graphical representation of attacks on security protocol
title_sort graphical representation of attacks on security protocol
topic DRNTU::Engineering::Computer science and engineering
url http://hdl.handle.net/10356/66777
work_keys_str_mv AT wangjianfang graphicalrepresentationofattacksonsecurityprotocol