Font Size: a A A

A Parallelization Research On Internet Protocol Security Based On Pi Calculus

Posted on:2017-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z HuiFull Text:PDF
GTID:2308330482989805Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As the security problems of network information are becoming more and more serious, the efficiency and security of network protocol have become one of the key points in scientific research. Therefore, researchers concentrate on the specific network security protocols in order to maximize the practical application performance in the existing safety standards.IPSec protocol aims to provide a whole set of security in network layer of OSI model. However, the Internet Engineering Task Force, who is the sponser of IPSec protocol, didn’t establish the detailed ways to deploy it in the two generations of update versions. And also IPSec protocol contains a number of protocols and standards. So for now, IPSec protocol has many kinds of implementations in practical application, and the main research direction tends to achieve more efficienct results without changing the effects.Pi calculus owns the ability to express messages passing in different processes. It can model existing programs and system theories and describe parallel processes so as to improve the efficiency and realize the parallelization models of IPSec protocol.In this article, we combine IPSec protocol framework, IKEv2 procotol and DES algorithm with Pi calculus separately. The contents of this paper are as follows:1) We define a model of parallel IPSec protocol framework based on Pi calculus, use Pict language, which is well correspondent to Pi calculus, to implement this model, make a comparison to the traditional model implied by C language in both run time and memory usage, and analyze the results;2) We define a model of parallel IKEv2 protocol based on Pi calculus which was not be discussed in part 1) to analyse and improve both efficiency and security, give a formal verification based on weak bisimulation, imply this model using Pict language, make a comparison to the traditional model implied by C language in more than one time of SA requests and analyze the results;3) We define a parallelization of DES algorithm based on Pi calculus without changing the encryption effect, which was mentioned in part 2), imply this model using Pict language, make a comparison to the traditional model implied by C language in run time, and analyze the results.Conbined with the work of this paper, the conclusion is: the three parallelization models show better performance compared with the original serial models, without changing the functions and the results. This provides a basis for IPSec protocol when it is implied in practical applications in the future.
Keywords/Search Tags:Pi calculus, IPSec protocol, IKEv2 protocol, DES algorithm
PDF Full Text Request
Related items