Injecting Heterogeneity Through Protocol Randomization

Li Zhuang, J. D. Tygar, Rachna Dhamija
2007 International Journal of Network Security  
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly generate security protocols as a method of introducing heterogeneity. We present the results of simulations for the case of two party authentication protocols and argue that choosing protocols randomly out of sets numbering in the hundreds of millions is practical and achievable with an acceptable overhead. To realize the
more » ... ulation, we implemented a highly efficient protocol verifier, achieving approximately two orders of magnitude improvement in performance compared to previous work.
dblp:journals/ijnsec/ZhuangTD07 fatcat:42xbi7w5yjhb7agpdkjsr4q62u