Cryptographic protocols' performance and network layer security of RSMAD

Author(s):  
Marcin Sokol ◽  
Slawomir Gajewski ◽  
Malgorzata Gajewska
2011 ◽  
Vol 32 (3) ◽  
pp. 161-169 ◽  
Author(s):  
Thomas V. Pollet ◽  
Sam G. B. Roberts ◽  
Robin I. M. Dunbar

Previous studies showed that extraversion influences social network size. However, it is unclear how extraversion affects the size of different layers of the network, and how extraversion relates to the emotional intensity of social relationships. We examined the relationships between extraversion, network size, and emotional closeness for 117 individuals. The results demonstrated that extraverts had larger networks at every layer (support clique, sympathy group, outer layer). The results were robust and were not attributable to potential confounds such as sex, though they were modest in size (raw correlations between extraversion and size of network layer, .20 < r < .23). However, extraverts were not emotionally closer to individuals in their network, even after controlling for network size. These results highlight the importance of considering not just social network size in relation to personality, but also the quality of relationships with network members.


Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


2021 ◽  
pp. 1-1
Author(s):  
Aziz Kocanaogullari ◽  
Niklas Smedemark-Margulies ◽  
Murat Akcakaya ◽  
Deniz Erdogmus

Sign in / Sign up

Export Citation Format

Share Document