# Modeling Cryptographic Protocols Using the Algebraic Processor

Title | Modeling Cryptographic Protocols Using the Algebraic Processor |

Publication Type | Conference Paper |

Year of Publication | 2018 |

Authors | Frolov, A. B., Vinnikov, A. M. |

Conference Name | 2018 IV International Conference on Information Technologies in Engineering Education (Inforino) |

Keywords | algebra, Automata, automata models, automata theory, chosen cipher text attack, Computational modeling, computer network, cryptographic primitives, cryptographic protocols, cryptography, cryptograthic protocol, Data models, Department of Mathematical Modeling, education-oriented capabilities, El Gamal signature, Human Behavior, information protection, Internet, Kerberos, Kerberos protocol, Key Distribution, key distribution protocols functionality, Mathematical model, Metrics, MPEI algebraic processor, private key cryptography, pubcrawl, remote computers, remote modeling, Resiliency |

Abstract | We present the IT solution for remote modeling of cryptographic protocols and other cryptographic primitives and a number of education-oriented capabilities based on them. These capabilities are provided at the Department of Mathematical Modeling using the MPEI algebraic processor, and allow remote participants to create automata models of cryptographic protocols, use and manage them in the modeling process. Particular attention is paid to the IT solution for modeling of the private communication and key distribution using the processor combined with the Kerberos protocol. This allows simulation and studying of key distribution protocols functionality on remote computers via the Internet. The importance of studying cryptographic primitives for future IT specialists is emphasized. |

URL | https://ieeexplore.ieee.org/document/8581781 |

DOI | 10.1109/INFORINO.2018.8581781 |

Citation Key | frolov_modeling_2018 |

- algebra
- automata
- automata models
- automata theory
- chosen cipher text attack
- Computational modeling
- computer network
- cryptographic primitives
- Cryptographic Protocols
- Cryptography
- cryptograthic protocol
- Data models
- Department of Mathematical Modeling
- education-oriented capabilities
- El Gamal signature
- Human behavior
- information protection
- internet
- Kerberos
- Kerberos protocol
- Key Distribution
- key distribution protocols functionality
- Mathematical model
- Metrics
- MPEI algebraic processor
- private key cryptography
- pubcrawl
- remote computers
- remote modeling
- Resiliency