Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses and Dissertations

2004

Data encryption (Computer science)

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Automating Security Protocol Analysis, Stephen W. Mancini Mar 2004

Automating Security Protocol Analysis, Stephen W. Mancini

Theses and Dissertations

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol 24, it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others 9 have identified several properties that good protocols often exhibit. Termed Authentication Tests, these properties have been very useful in examining protocols. The purpose of this research is …


Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson Mar 2004

Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson

Theses and Dissertations

As wireless networks become an increasingly common part of the infrastructure in industrialized nations, the vulnerabilities of this technology need to be evaluated. Even though there have been major advancements in encryption technology, security protocols and packet header obfuscation techniques, other distinguishing characteristics do exist in wireless network traffic. These characteristics include packet size, signal strength, channel utilization and others. Using these characteristics, windows of size 11, 31, and 51 packets are collected and machine learning (ML) techniques are trained to classify applications accessing the 802.11b wireless channel. The four applications used for this study included E-Mail, FTP, HTTP, and …