{"title":"Experimental Analysis of Key Exchange Protocols Using the JAKE Framework","authors":"Octavian Catrina, R. Lupu","doi":"10.1109/comm54429.2022.9817171","DOIUrl":null,"url":null,"abstract":"The paper presents JAKE, a lightweight Java frame-work that supports the prototype implementation and experimental analysis of cryptographic protocols used to establish secure communication channels. A first goal is to provide a common platform for experiments with various key exchange protocol constructions and cryptographic algorithm configurations, simplifying their comparative performance analysis. Another goal is to facilitate proof-of-concept implementations of attacks on these protocols. The paper presents the system architecture used for JAKE implementations and experiments, examples of implemented protocols and performance measurements, as well as examples of attacks on (vulnerable variants) of the protocols.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Communications (COMM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/comm54429.2022.9817171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The paper presents JAKE, a lightweight Java frame-work that supports the prototype implementation and experimental analysis of cryptographic protocols used to establish secure communication channels. A first goal is to provide a common platform for experiments with various key exchange protocol constructions and cryptographic algorithm configurations, simplifying their comparative performance analysis. Another goal is to facilitate proof-of-concept implementations of attacks on these protocols. The paper presents the system architecture used for JAKE implementations and experiments, examples of implemented protocols and performance measurements, as well as examples of attacks on (vulnerable variants) of the protocols.