Update on Overleaf.
This commit is contained in:
parent
22d547ed23
commit
f02e490de0
@ -15,7 +15,7 @@ Proxying packets is the process of taking packets that arrive at one location an
|
||||
% ----------------------------- Threat Model ------------------------------- %
|
||||
\section{Threat Model}
|
||||
|
||||
The threat model that the security of this application will be considered under is the Dolev Yao model
|
||||
The threat model that the security of this application will be considered under is a modified Dolev Yao model \citep{dolev_security_1983}.
|
||||
|
||||
% ---------------------------- Risk Analysis ------------------------------- %
|
||||
\section{Risk Analysis}
|
||||
@ -117,6 +117,10 @@ This threat is based on an attacker wishing to force cost upon you. In the examp
|
||||
|
||||
This section provides means of confronting the threats given in section \ref{section:threat-model}, in order to alleviate the additional risk of proxying traffic.
|
||||
|
||||
\subsection{IP Authentication Header}
|
||||
|
||||
|
||||
|
||||
\subsection{Message Authentication}
|
||||
|
||||
To provide integrity and authentication for each message, I evaluate two choices: Message Authentication Codes (MACs) or Digital Signatures. A MAC combines the data with a shared key using a specific method, before using a one-way hash function to generate a message authentication code, and thus the result is only verifiable by someone with the same private key \citep[pp. 352]{menezes_handbook_1997}. Producing a digital signature for a message uses the private key in public/private keypair to produce a digital signature for a message, proving that the message was produced by the owner of the private key, which can be verified by anyone with the public key \citep[pp. 147-149]{anderson_security_2008}. In both cases, the message authentication code is appended to the message, such that the integrity and authenticity of the message can be verified.
|
||||
|
Loading…
Reference in New Issue
Block a user