Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Title | Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Fattahi, J., Mejri, M., Ziadia, M., Ghayoula, E., Samoud, O., Pricop, E. |
Conference Name | 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) |
Keywords | authentication, composability, critical military missions, cryptographic protocol, cryptographic protocols, decision level, digital signatures, distributed decision, Encryption, Human Behavior, human factor, independent decision, independent distributed decision levels, Internet, Logistics, man-in-the-middle attack, Metrics, military computing, military context, military mission, multipart military missions, multipart missions, non-repudiation, pubcrawl, Repudiation, resilience, Resiliency, secrecy, secure cryptographic protocol, secure protocol, security level, security levels |
Abstract | In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the Internet using cryptographic protocols. In such protocols, few security properties have to be ensured. However, designing a secure cryptographic protocol that ensures several properties at once is a very challenging task. In this paper, we propose a new secure protocol for multipart military missions that involve two independent and distributed decision levels having different security levels. We show that it ensures the secrecy, authentication, and non-repudiation properties. In addition, we show that it resists against man-in-the-middle attacks. |
URL | https://ieeexplore.ieee.org/document/8122763/ |
DOI | 10.1109/SMC.2017.8122763 |
Citation Key | fattahi_cryptographic_2017 |
- Metrics
- security levels
- security level
- secure protocol
- secure cryptographic protocol
- secrecy
- Resiliency
- resilience
- Repudiation
- pubcrawl
- non-repudiation
- multipart missions
- multipart military missions
- military mission
- military context
- military computing
- authentication
- man-in-the-middle attack
- Logistics
- internet
- independent distributed decision levels
- independent decision
- human factor
- Human behavior
- encryption
- distributed decision
- digital signatures
- decision level
- Cryptographic Protocols
- cryptographic protocol
- critical military missions
- composability