Posted: January 1st, 2014

Security protocol verification

Title of Assignment : Security protocol verification                     

Module Learning Outcomes for This Assignment

  1. 3) CRITICALLY EVALUATE VARIOUS MECHANISMS, ALGORITHMS AND PROTOCOLS USED TO SECURE COMPUTER SYSTEMS FROM RESEARCH AND DIRECT INVESTIGATION AND ANALYSIS OF DATA COLLECTED.

 

Assignment description

1. What you are required to do.
a) Choose 2 security protocol modelling/checking/verification/analysis methods. To help you with this, I have provided a list of some methods below. You can choose 2 from this list or can include others that you find. However, ensure that you do not confuse tools and techniques used to model/analyse protocols from a simple communications aspect with those used to analyse/model security behaviour.
List of some security protocol modelling/analysis/checking/verification methods:
BAN logic (but you could instead cover a derivative logic like GNY or SVO).
NRL Analyser
B-method
Strand spaces
SPA (Secure Process Algebra)
Inductive approach
Spi calculus
FDR and Casper
Bellare-Rogaway model
b) Write a report explaining how each of the 2 methods you have chosen works and what are the strengths and weaknesses, problems, issues, advantages, disadvantages, etc.
c) Make a comparison of the 2 methods and select and justify your selection of which one you would prefer to use to provide evidence that a given security protocol is secure and would achieve its goals.

2. What is to be handed in.

You are expected to hand in the following 2 items:
1) A report that contains the following:
Report Section
Content guidelines
Length guidelines*
Critical review of 2 methods
A critical review of the 2 chosen security protocol verification methods i.e. explain how they work, and explain their strengths and weaknesses, etc.
1000 words*
Comparison, selection and justification of preferred method.
Compare the 2 methods and select and justify the selection of the one of the methods as your preferred method.
500 words*
Appendix A
You could place in an appendix any extended example of the use of any of the methods investigated or other concrete evidence that you might refer to in the body of your report.
*you will not be penalised for having fewer or more words than is stated in the guideline – it is just a guide. Note quality is more important than quantity.
2) An electronic versions of the report.
NOTE – Failure to hand-in component sections of the report will lead to 0 being given for that section of the report.
Assessment criteria
Mark weightings
Report section.
%
Critical appraisal of security protocol verification methods considered
75%
Comparison. selection and justification of preferred method
25%
Quality evaluation criteria
Report section.
Marking criteria
Note – The criteria below are not individually weighted within a section. Marks will be attributed by considering all relevant assessment evaluation criteria. Some criteria may be inapplicable depending upon the extent to which certain other criteria have been met. 
Critical appraisal of security protocol verification methods considered
i) the nature and reliability of the evidence used
ii) the extent to which assertions are the conclu
sion to a valid argument based on relevant and cogent evidence.
iii) the extent to which evaluative criteria used/chosen as the basis of criticism/evaluation support the achievement of security protocol goals.
iv) the extent to which the analysis of the methods explains their properties/behaviour
to the characteristics/properties of the methods
Comparison, selection and justification of preferred method.
i) the nature and reliability of the evidence used
ii) the extent to which assertions are the conclusion to a valid argument based on relevant and cogent evidence.
iii) the extent to which evaluative criteria chosen as the basis of comparison, selection and justification support the achievement of security protocol goals.
iv) the extent to which comparisons are valid deductions from the application of evaluative criteria
v) the extent to which the method selected fulfils the criteria used for their justification

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00