Modeling Cryptographic Protocols Using the Algebraic Processor
Title | Modeling Cryptographic Protocols Using the Algebraic Processor |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Frolov, A. B., Vinnikov, A. M. |
Conference Name | 2018 IV International Conference on Information Technologies in Engineering Education (Inforino) |
Keywords | algebra, Automata, automata models, automata theory, chosen cipher text attack, Computational modeling, computer network, cryptographic primitives, cryptographic protocols, cryptography, cryptograthic protocol, Data models, Department of Mathematical Modeling, education-oriented capabilities, El Gamal signature, Human Behavior, information protection, Internet, Kerberos, Kerberos protocol, Key Distribution, key distribution protocols functionality, Mathematical model, Metrics, MPEI algebraic processor, private key cryptography, pubcrawl, remote computers, remote modeling, Resiliency |
Abstract | We present the IT solution for remote modeling of cryptographic protocols and other cryptographic primitives and a number of education-oriented capabilities based on them. These capabilities are provided at the Department of Mathematical Modeling using the MPEI algebraic processor, and allow remote participants to create automata models of cryptographic protocols, use and manage them in the modeling process. Particular attention is paid to the IT solution for modeling of the private communication and key distribution using the processor combined with the Kerberos protocol. This allows simulation and studying of key distribution protocols functionality on remote computers via the Internet. The importance of studying cryptographic primitives for future IT specialists is emphasized. |
URL | https://ieeexplore.ieee.org/document/8581781 |
DOI | 10.1109/INFORINO.2018.8581781 |
Citation Key | frolov_modeling_2018 |
- Human behavior
- Resiliency
- remote modeling
- remote computers
- pubcrawl
- private key cryptography
- MPEI algebraic processor
- Metrics
- Mathematical model
- key distribution protocols functionality
- Key Distribution
- Kerberos protocol
- Kerberos
- internet
- information protection
- algebra
- El Gamal signature
- education-oriented capabilities
- Department of Mathematical Modeling
- Data models
- cryptograthic protocol
- Cryptography
- Cryptographic Protocols
- cryptographic primitives
- computer network
- Computational modeling
- chosen cipher text attack
- automata theory
- automata models
- automata