A NOVEL METHODOLOGY TO DESIGN SECURITY PROTOCOLS BASED ON A NEW SET OF DESIGN PRINCIPLES

Authors

  • Rosa Elena Di Costanzo Tecnológico de Monterrey Campus Toluca, Associate Professor of Computer Science, Dept. of Computer Science and Information Systems Mexico
  • Luciano Chirinos Tecnológico de Monterrey Campus Toluca, Full professor of Electronics and Mechatronics, Dept. of Mechatronics, Head of the Mechatronics Undergraduate Program, Mexico

DOI:

https://doi.org/10.19044/esj.2014.v10n3p%25p

Abstract

This paper presents a novel design methodology based on a new set of design principles to develop step-by-step security protocols for up to three participants, guiding the designer on each step. It accompanies the designer through a succession of six abstraction levels proposed in this work: protocol objectives, protocol constraints, security mechanisms, message flow, protocol conformation and authentication tests. The methodology proposed is based on a new set of design principles extracted from different sources and combined using the systemic approach, which considers the designer and client’s security and functional needs. The resulting model separates highlevel tasks from implementation details, allowing the designer to specify the security requirements and functionality desired for each abstraction level. Consequently, the protocol design is linked with the best-fitting design principle. To corroborate the results of the methodology, the resulting protocol in the Alice and Bob notation in the fifth level is tested using the “Strand Spaces†Model. The Needham-Schroeder protocol with symmetric keys was successfully used as a test. The security goals achieved were: authentication, confidentiality, integrity, and non-repudiation.

Downloads

Download data is not yet available.

PlumX Statistics

Downloads

Published

2014-01-31

How to Cite

Di Costanzo, R. E., & Chirinos, L. (2014). A NOVEL METHODOLOGY TO DESIGN SECURITY PROTOCOLS BASED ON A NEW SET OF DESIGN PRINCIPLES. European Scientific Journal, ESJ, 10(3). https://doi.org/10.19044/esj.2014.v10n3p%p