Optimization of TLS security protocol using the adaptable security model
Abstract
Security protocols used in today's communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parties are crucial as for as efficiency is concerned. However, optimization cannot significantly reduce the security of the process. We must remember that in many fields (e.g. e-banking, e-court etc.) security level will always be the main factor. In this paper, we show how to optimize security protocols in terms of the security level. We present the visualization tool for the adaptable security model, which defines the protection level of the transmitted data. These elements help us analyze and optimize a cryptographic protocol. The presented optimization results are based on the TLS protocol. We describe this protocol by the adaptable model and we create different versions of the protocol. Finally, we discuss differences between them and their impact on the protection level.
Full Text:
PDFDOI: http://dx.doi.org/10.2478/v10065-009-0005-0
Date of publication: 2015-01-04 00:00:00
Date of submission: 2016-04-27 15:28:18
Statistics
Total abstract view - 515
Downloads (from 2020-06-17) - PDF - 0
Indicators
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Annales UMCS Sectio AI Informatica
This work is licensed under a Creative Commons Attribution 4.0 International License.