Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution

Abstract

Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer networks and the Internet is undeniably useful. However, as computer and network technology continues to become increasingly advanced, the threat and number of cyber-attacks rises. Without advanced and well-developed security protocols, companies, businesses, colleges, and even ordinary individuals would be at the mercy of malicious hackers. This paper focuses on security protocols such as PGP, 3PAKE, and TLS’s processes, design, history, advantages, and disadvantages. Research for this article was conducted through reading numerous scholarly articles, conference articles, and IT and information security textbooks. The purpose of this article is to expose and elaborate on vulnerabilities in popular security protocols, introduce lesser-known protocols with great potential, and lastly, provide suggestions for future directions and modifications to improve security protocols through qualitative and theoretical research.

Authors and Affiliations

Young B. Choi, Nathan D. Hunter

Keywords

Related Articles

Integrated Framework to Study Efficient Spectral Estimation Techniques for Assessing Spectral Efficiency Analysis

The advanced network applications enable software driven spectral analysis of non-stationary signal or processes which precisely involves domain analysis with the purpose of decomposing a complex signal coefficients into...

Causal Impact Analysis on Android Market

Google play store contains a large repository of apps for android users. Play store has two billion active users that have two million apps to download and use. App developers are competing to get a higher success rate a...

Competitive Sparse Representation Classification for Face Recognition

A method, named competitive sparse representation classification (CSRC), is proposed for face recognition in this paper. CSRC introduces a lowest competitive deletion mechanism which removes the lowest competitive sample...

Design and Implementation for Multi-Level Cell Flash Memory Storage Systems

The flash memory management functions of write coalescing, space management, logical-to-physical mapping, wear leveling, and garbage collection require significant on-going computation and data movement. MLC flash memory...

Formal Specification of Memory Coherence Protocol

Memory coherence is the most fundamental re-quirement in a shared virtual memory system where there are concurrent as well as loosely coupled processes. These processes can demand a page for reading or writing. The memor...

Download PDF file
  • EP ID EP249924
  • DOI 10.14569/IJACSA.2017.080145
  • Views 77
  • Downloads 0

How To Cite

Young B. Choi, Nathan D. Hunter (2017). Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution. International Journal of Advanced Computer Science & Applications, 8(1), 365-360. https://europub.co.uk/articles/-A-249924