Corpus ID: 11677722

Security Agility Solution Independent of the Underlaying Protocol Architecture

  title={Security Agility Solution Independent of the Underlaying Protocol Architecture},
  author={V. Vasic and M. Mikuc},
Cryptographic protocols are constantly exposed to new at- tack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic pro- tocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable protocols could be easily replaced with new ones. The agile cryptographic negotiation protocol (ACNP) proposed in this paper repre- sents a layer-agnostic… Expand
On PQC Migration and Crypto-Agility
This work provides a literature survey and a snapshot of the discovered challenges and solutions categorized in different areas and offers a single entry-point into the subject reflecting the current state in a timely manner. Expand
Adaptable secure communication for the Cloud of Things
This work presents an original solution, which uses the Agile Cryptographic Agreement Protocol in the context of CoT, and defines six secure communication operations to enable CoT entities to autonomously and dynamically agree on the security protocol and cryptographic keys used for communication. Expand


The Secure Shell (SSH) Transport Layer Protocol
The SSH transport layer protocol is described, which typically runs on top of TCP/IP, and key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated. Expand
Security agility for dynamic execution environments
Techniques developed by the Security Agility for Dynamic Execution Environments project are encapsulated in a prototype toolkit for integration with software components so they may function effectively in a dynamic security environment. Expand
The Secure Shell (SSH) Protocol Architecture
This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents, and discusses the SSH algorithm naming system that allows local extensions. Expand
The Transport Layer Security (TLS) Protocol Version 1.2
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements of the Transport Layer Security (TLS) protocol. Expand
Deploying new hash algorithms in Secure Neighbor Discovery
  • V. Vasic, A. Kukec, M. Mikuc
  • Computer Science
  • SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks
  • 2011
This paper proposes the most efficient solution — a solution for SEND hash agility based on a negotiation approach and analyzes of attacks on hash functions, use of hashes in SEND, impact of hash attacks, and propose and evaluate possible approaches to allowing hash agility. Expand
Security agility in response to intrusion detection
  • M. J. Petkac, L. Badger
  • Computer Science
  • Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
  • 2000
Security agility, a strategy to provide software components with the security awareness and adaptability to address runtime security policy changes, is presented and how the toolkit can be integrated with intrusion detection and response frameworks to help automate flexible host-based response to intrusions is illustrated. Expand
An Algorithm-Agile Cryptographic Co-processor Based on FPGAs
This contribution describes the design and implementation of an algorithm-agile cryptographic co-processor board which can be dynamically configured with a variety of block ciphers and contains a RAM with a collection of FPGA configuration files. Expand
Key Management In Distributed Systems
A cryptographic key management system for distributed networks that prevents data loss even if the underlying repository does not ensure consistency/atomic operations. Expand
The Secure Sockets Layer (SSL) Protocol Version 3.0
This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery. Expand
Algorithm-Agile Encryption in ATM Networks
Algorithm flexibility allows users to select an appropriate algorithm to implement security services for a given transmission, which helps reduce operational costs, since multiple algorithms-which are typically implemented in several encryptors-can all be implemented in one device. Expand