A Java Beans Component Architecture for Cryptographic Protocols

Global networking has brought with it both new opportunities and new security threats on a worldwide scale. Since the Internet is inherently insecure, secure cryptographic protocols and a public key infrastructure are needed. In this paper we introduce a protocol component architecture that is well suited for the implementation of telecommunications protocols in general and cryptographic protocols in particular. Our implementation framework is based on the Java programming language and the Conduits+ protocol framework. It complies with the Beans architecture and security API of JDK 1.1, allowing its users to implement application specific secure protocols with relative ease. Furthermore, these protocols can be safely downloaded through the Internet and run on virtually any workstation equipped with a Java capable browser*. The framework has been implemented and tested in practice with a variety of cryptographic protocols. The framework is relatively independent of the actual cryptosystems used and relies on the Java 1.1 public key security API. Future work will include Java 1.2 support, and utilization of a graphical Beans editor to further ease the work of the protocol composer.

[1]  Gustavus J. Simmons,et al.  Cryptanalysis and protocol failures , 1994, CACM.

[2]  Larry L. Peterson,et al.  The x-Kernel: An Architecture for Implementing Network Protocols , 1991, IEEE Trans. Software Eng..

[3]  C SchmidtDouglas Using design patterns to develop reusable object-oriented communication software , 1995 .

[4]  Rachid Guerraoui,et al.  Using the Strategy Design Pattern to Compose Reliable Distributed Protocols , 1997, COOTS.

[5]  Jeannette M. Wing,et al.  Fast, automatic checking of security protocols , 1996 .

[6]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[7]  Jeannette M. Wing,et al.  Specification matching of software components , 1995, TSEM.

[8]  Robbert van Renesse,et al.  Horus: a flexible group communication system , 1996, CACM.

[9]  Ross J. Anderson,et al.  Programming Satan's Computer , 1995, Computer Science Today.

[10]  Peter,et al.  Formal Methods for the Analysis of Authentication , 1993 .

[11]  Bertrand Meyer The Next Software Breakthrough , 1997, Computer.

[12]  Ralph E. Johnson,et al.  Patterns Generate Architectures , 1994, ECOOP.

[13]  Larry L. Peterson,et al.  A dynamic network architecture , 1992, TOCS.

[14]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[15]  Kenneth P. Birman,et al.  The ISIS project: real experience with a fault tolerant programming system , 1990, EW 4.

[16]  David Garlan,et al.  A formal basis for architectural connection , 1997, TSEM.

[17]  Douglas C. Schmidt,et al.  Using design patterns to develop reusable object-oriented communication software , 1995, CACM.

[18]  Ross J. Anderson,et al.  Robustness Principles for Public Key Protocols , 1995, CRYPTO.

[19]  S. O'Malley,et al.  THE ROAD TO NETWORK SECURITY OR THE VALUE OF SMALL COBBLESTONES , 1994 .

[20]  Joyce Farrell Java Programming , 1999 .

[21]  R. E. Johnson,et al.  The Conduit: A Communication Abstraction in C++ , 1990, C++ Conference.

[22]  Peter Honeyman,et al.  Formal Methods for the Analysis of Authentication Protocols , 1993 .

[23]  T. Aalto,et al.  A Modular, STREAMS Based IPSEC for Solaris 2.x Systems , 1996 .

[24]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[25]  Jeannette M. Wing,et al.  Specification matching of software components , 1997 .

[26]  Ken Arnold,et al.  The Java Programming Language , 1996 .

[27]  Robbert van Renesse,et al.  A security architecture for fault-tolerant systems , 1994, TOCS.

[28]  Roy Friedman,et al.  A framework for protocol composition in Horus , 1995, PODC '95.

[29]  Ralph Johnson,et al.  A framework for network protocol software , 1995, OOPSLA.

[30]  Colin Boyd,et al.  Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.

[31]  J. Doug Tygar,et al.  A Model for Secure Protocols and Their Compositions , 1996, IEEE Trans. Software Eng..