Update on Overleaf.

This commit is contained in:
jsh77 2021-01-29 23:17:03 +00:00 committed by overleaf
parent 22d547ed23
commit f02e490de0

View File

@ -15,7 +15,7 @@ Proxying packets is the process of taking packets that arrive at one location an
% ----------------------------- Threat Model ------------------------------- %
\section{Threat Model}
The threat model that the security of this application will be considered under is the Dolev Yao model
The threat model that the security of this application will be considered under is a modified Dolev Yao model \citep{dolev_security_1983}.
% ---------------------------- Risk Analysis ------------------------------- %
\section{Risk Analysis}
@ -117,6 +117,10 @@ This threat is based on an attacker wishing to force cost upon you. In the examp
This section provides means of confronting the threats given in section \ref{section:threat-model}, in order to alleviate the additional risk of proxying traffic.
\subsection{IP Authentication Header}
\subsection{Message Authentication}
To provide integrity and authentication for each message, I evaluate two choices: Message Authentication Codes (MACs) or Digital Signatures. A MAC combines the data with a shared key using a specific method, before using a one-way hash function to generate a message authentication code, and thus the result is only verifiable by someone with the same private key \citep[pp. 352]{menezes_handbook_1997}. Producing a digital signature for a message uses the private key in public/private keypair to produce a digital signature for a message, proving that the message was produced by the owner of the private key, which can be verified by anyone with the public key \citep[pp. 147-149]{anderson_security_2008}. In both cases, the message authentication code is appended to the message, such that the integrity and authenticity of the message can be verified.