Visible to the public Automated Verification in Cryptography System

TitleAutomated Verification in Cryptography System
Publication TypeConference Paper
Year of Publication2016
AuthorsJebadurai, N. Immanuel, Gupta, Himanshu
Conference NameProceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
Date PublishedMarch 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-3962-9
Keywords3DES, Collaboration, compositionality, CRAM-MD5, E-Voting Protocol, HMAC-MD5, Multiphase Encryption, Multiple Encryption, privacy, protocol verification, pubcrawl, RSA, UID
Abstract

Cryptographic protocols and algorithms are the strength of digital era in which we are living. Unluckily, the security of many confidential information and credentials has been compromised due to ignorance of required security services. As a result, various attacks have been introduced by talented attackers and many security issues like as financial loss, violations of personal privacy, and security threats to democracy. This research paper provides the secure design and architecture of cryptographic protocols and expedites the authentication of cryptographic system. Designing and developing a secure cryptographic system is like a game in which designer or developer tries to maintain the security while attacker tries to penetrate the security features to perform successful attack.

URLhttps://dl.acm.org/doi/10.1145/2905055.2905208
DOI10.1145/2905055.2905208
Citation Keyjebadurai_automated_2016