Title of Assignment : Security protocol verification
|
1. What you are required to do.
a) Choose 2 security protocol modelling/checking/verification/analysis methods. To help you with this, I have provided a list of some methods below. You can choose 2 from this list or can include others that you find. However, ensure that you do not confuse tools and techniques used to model/analyse protocols from a simple communications aspect with those used to analyse/model security behaviour.
List of some security protocol modelling/analysis/checking/verification methods:
BAN logic (but you could instead cover a derivative logic like GNY or SVO).
NRL Analyser
B-method
Strand spaces
SPA (Secure Process Algebra)
Inductive approach
Spi calculus
FDR and Casper
Bellare-Rogaway model
b) Write a report explaining how each of the 2 methods you have chosen works and what are the strengths and weaknesses, problems, issues, advantages, disadvantages, etc.
c) Make a comparison of the 2 methods and select and justify your selection of which one you would prefer to use to provide evidence that a given security protocol is secure and would achieve its goals.
.
You are expected to hand in the following 2 items:
1) A report that contains the following:
Report Section |
Content guidelines |
Length guidelines* |
Critical review of 2 methods |
A critical review of the 2 chosen security protocol verification methods i.e. explain how they work, and explain their strengths and weaknesses, etc. |
1000 words* |
Comparison, selection and justification of preferred method. |
Compare the 2 methods and select and justify the selection of the one of the methods as your preferred method. |
500 words* |
Appendix A |
You could place in an appendix any extended example of the use of any of the methods investigated or other concrete evidence that you might refer to in the body of your report. |
*you will not be penalised for having fewer or more words than is stated in the guideline – it is just a guide. Note quality is more important than quantity.
2) An electronic versions of the report.
NOTE
– Failure to hand-in component sections of the report will lead to 0 being given for that section of the report.
Mark weightings
Report section. |
% |
Critical appraisal of security protocol verification methods considered |
75% |
Comparison. selection and justification of preferred method |
25% |
Quality evaluation criteria
Report section. |
Marking criteria Note – The criteria below are not individually weighted within a section. Marks will be attributed by considering all relevant assessment evaluation criteria. Some criteria may be inapplicable depending upon the extent to which certain other criteria have been met. |
Critical appraisal of security protocol verification methods considered |
i) the nature and reliability of the evidence used ii) the extent to which assertions are the conclusion to a valid argument based on relevant and cogent evidence. iii) the extent to which evaluative criteria used/chosen as the basis of criticism/evaluation support the achievement of security protocol goals. iv) the extent to which the analysis of the methods explains their properties/behaviour to the characteristics/properties of the methods |
Comparison, selection and justification of preferred method. |
i) the nature and reliability of the evidence used ii) the extent to which assertions are the conclusion to a valid argument based on relevant and cogent evidence. iii) the extent to which evaluative criteria chosen as the basis of comparison, selection and justification support the achievement of security protocol goals. iv) the extent to which comparisons are valid deductions from the application of evaluative criteria v) the extent to which the method selected fulfils the criteria used for their justification |
.
Click here to get this paper done by our professional writers at an affordable price!!