Visible to the public Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context

TitleCryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Publication TypeConference Paper
Year of Publication2017
AuthorsFattahi, J., Mejri, M., Ziadia, M., Ghayoula, E., Samoud, O., Pricop, E.
Conference Name2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)
Keywordsauthentication, composability, critical military missions, cryptographic protocol, cryptographic protocols, decision level, digital signatures, distributed decision, Encryption, Human Behavior, human factor, independent decision, independent distributed decision levels, Internet, Logistics, man-in-the-middle attack, Metrics, military computing, military context, military mission, multipart military missions, multipart missions, non-repudiation, pubcrawl, Repudiation, resilience, Resiliency, secrecy, secure cryptographic protocol, secure protocol, security level, security levels
Abstract

In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the Internet using cryptographic protocols. In such protocols, few security properties have to be ensured. However, designing a secure cryptographic protocol that ensures several properties at once is a very challenging task. In this paper, we propose a new secure protocol for multipart military missions that involve two independent and distributed decision levels having different security levels. We show that it ensures the secrecy, authentication, and non-repudiation properties. In addition, we show that it resists against man-in-the-middle attacks.

URLhttps://ieeexplore.ieee.org/document/8122763/
DOI10.1109/SMC.2017.8122763
Citation Keyfattahi_cryptographic_2017