<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>AT</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Security agility solution independent of the underlaying protocol architecture?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valter Vasic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miljenko Mikuc</string-name>
          <email>miljenko.mikucg@fer.hr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Zagreb, Faculty of Electrical Engineering and Computing</institution>
          ,
          <addr-line>Unska 3, 10000 Zagreb</addr-line>
          ,
          <country country="HR">Croatia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <volume>15</volume>
      <fpage>15</fpage>
      <lpage>16</lpage>
      <abstract>
        <p>Cryptographic protocols are constantly exposed to new attack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable protocols could be easily replaced with new ones. The agile cryptographic negotiation protocol (ACNP) proposed in this paper represents a layer-agnostic, robust solution that can be deployed for providing cryptographic agility and greatly improve security. It provides minimal communication overhead and represents a universal and secure solution independent of the communication layer and application that uses it.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Cryptographic protocols represent the main tools to achieve a secure
environment in network communications. Symmetric cryptography is used to ensure
secrecy, asymmetric cryptography provides for signing and authentication whereas
hash algorithms ensure data integrity. A combination of all these types of
algorithms is needed for securing network communication. Digital signatures and
HMACs (Hash Message Authentication Code) are examples of these
combinations. Digital signatures are a combination of hash functions and public key
cryptography. HMACs represent a tool for providing integrity, where the
message is concatenated with a common secret, and then hashed. HMACs exploit
the possibility of two nodes to generate a common secret to protect future
communication, such as Di e-Hellman.[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
      </p>
      <p>A wide range of cryptographic protocols is available for each cryptographic
method. Newer and better algorithms are introduced constantly. At the same
time new and more e cient attacks against the existing algorithms are found
and thus become less secure. This problem can be solved by using cryptographic
protocol agility which would enable the introduction of newer protocols without
changing speci cations and implementations of communication protocols.</p>
      <p>
        As cryptographic protocols become less and less secure during time so do the
protocols that use them. A fair number of protocols (SEND [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], GSM, CDMA)
use only one hard coded version of cryptographic protocols that has been
speci ed when the protocol was designed. This could automatically make the
protocol vulnerable when the used version of the cryptographic protocol has an
e cient attack against it. Similar problems are happening to the GSM protocol
because the cipher, A5, has successful attacks against it. The static cryptographic
protocol de nition problem is already recognized and solved in speci c
protocols like the SSL(Secure Sockets Layer)/TLS(Transport Layer Security)[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ],
SSH(Secure Shell)[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] protocol and IPsec protocol [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. However these protocols
can assure security just for a speci c application (SSH for a remote shell and
data transfer) or on a speci c layer (SSL/TLS only works on the application
layer while IPsec works only on the IP layer).
      </p>
      <p>One of the possible pitfalls of SSL/TLS and IPsec is the aim to provide a
whole security solution and implement both the negotiation algorithm and the
needed cryptographic algorithms. This greatly complicates the whole
implementation and possible deployment.</p>
      <p>This paper recommends a new negotiation protocol that enables the
possibility to negotiate cryptographic protocols instead of deciding upon and using
only one version of the needed cryptographic protocols. This would enable the
usage of cryptographic protocols just from the aspect of what they provide.
Lets assume that a designer wants to assure integrity for the messages that are
transferred through the network. For assuring integrity a cryptographic hash
algorithm should be used. The negotiation protocol would negotiate the
preferred version of the needed protocol and forward the agreed protocol to the
application. The negotiation would be integrated in the application and would
greatly simplify and secure the protocol that is being designed as it prevents the
usage of an outdated protocol. It creates an abstract layer for the programmer
who could use cryptographic protocols as a tool without thinking of the speci c
implementations and versions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        Signature algorithm agility is introduced in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] argues the bene ts of hash
agility in the SEND protocol, a security extension for the ND protocol in IPv6.
It proposes a negotiation approach which could be used for determining which
hash algorithms should be used for securing communication using the SEND
protocol. An interesting notion is also the usage of prede ned suites which could
simplify negotiation and achieve a complete set of cryptographic protocols with
less communication overhead.
      </p>
      <p>
        The SSH speci cation [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] introduces a way to negotiate algorithms for which
we can assume that works well because it is thoroughly tested. A list of acceptable
algorithms is exchanged in order of preference. The chosen algorithm must be
the rst algorithm on the client's list that is also on the server's list. If there is
no such algorithm, both sides must disconnect.
      </p>
      <p>
        On the other hand [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] addresses the need for every SSH server host to have
it's own key so that each server can be unambiguously identi ed. The client must
have a priori knowledge of the servers key. Two di erent trust models can be
used:
{ The client has a local database that associates each host name with the
corresponding public host key. This method requires no centrally administered
infrastructure, and no third-party coordination. The downside is that the
database of name-to-key associations may become burdensome to maintain.
{ The hosts name-to-key association is certi ed by a trusted certi cation
authority (CA). The client only knows the CA root key, and can verify the
validity of all host keys certi ed by accepted CAs.
      </p>
      <p>The usage of public key for host communication enables a secure environment
for communicating and negotiating cryptographic protocols.</p>
      <p>
        Cryptographic and security agility solutions have been provided for managing
security protocols in a private (corporate) network. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ][
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] The main obstacles
of deploying such solution in a distributed manner is the centralized architecture
that depends on a single system that distributes and manages security
preferences throughout the network. A similar system that attempts to distribute
symmetric cryptographic keys in an Active Directory managed network is also
dependent on the domain controllers. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Cryptographic agility</title>
      <p>
        The notion of cryptographic agility enables the improvement and adaptation of
new cryptographic algorithms opposed to the currently speci ed xed selection
of cryptographic algorithms. Cryptographic agility would mitigate the problems
of transitioning to a newer version of a cryptographic protocol which is
thoroughly analyzed in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Agility coupled with a well tested negotiation protocol
enables data protection through cryptographic protocols by mitigating the
interoperability issues between communicating network nodes. The importance of
agility has been acknowledged even in older protocols such as ATM [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
Cryptographic agility has also been proposed to be implemented on boards based on
FPGAs [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
3.1
      </p>
      <sec id="sec-3-1">
        <title>Negotiation principles</title>
        <p>
          Negotiation methods are the same as in the SSH protocol. The SSH protocol
has a server side and a client side. In this protocol the client is the side that
initiates the negotiation, whereas the server is the other host. The basic idea
of the negotiation protocol can be found in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. An example will be shown to
illustrate the behavior.
        </p>
        <p>
          Before the algorithm lists can be exchanged the hosts need to pass through
the initial leap of faith [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and accept their respective public keys. When the
keys are acquired they can digitally sign the messages that are needed in the
negotiation process. This is done only once for a speci c host or until its IP
address or public key change. The same procedure is needed in the SSH protocol
when the hosts communicate for the rst time.
        </p>
        <p>The initiating host (client) supports the following hash algorithms and prefers
to use them in the following order:
1. SHA-256
2. SHA-512
3. SHA-1
4. MD5
The other host (SSH server) supports hash algorithms in this order:
1. SHA-1
2. SHA-256
3. MD5
Although it's unconventional to place the less secure SHA-1 protocol before the
SHA-256 protocol such ordering may be enforced by a security policy that is
commonly present in an enterprise environment.</p>
        <p>An illustration of the message exchange is shown in gure 1.</p>
        <p>After the ordered list of protocols is exchanged between the hosts the decision
is made as follows. The rst item that is on the clients list and is also present
on the server list is the SHA-1 protocol, which will be chosen for usage in the
application that initiated the negotiation. Since negotiation in the SSH protocol
is just the beginning part there is no need for additional con rmation. In the
negotiation protocol it is necessary to send a con rmation message to con rm
the decision or an abort message if the nodes couldn't agree on an algorithm.</p>
        <p>The list could be further enhanced by introducing weight values to the
algorithms in the algorithm list. This can increase granularity and facilitate creating
custom lists that abide by a speci c security policy.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Negotiation protocol</title>
      <p>The placement of the Agile cryptographic negotiation protocol (ACNP) in the
TCP/IP stack could be anywhere in the IP protocol stack. It can be deployed
directly above the data link layer, above the IP layer, and above the transport
layer (TCP, UDP, SCTP, ...). UDP is a good choice since it removes the
handshake overhead caused by TCP and simpli es message delimiting. Lower layers
are similar to UDP but remove the additional header data (UDP, IP header) On
the other hand TCP provides a guaranteed delivery of messages. The choice of
the layer is left to the programmer integrating the Agile Cryptographic
Negotiation Protocol (ACNP) in an another protocol. The ACNP implementation will
provide the possibility to use IP and Ethernet layers and the most widely used
transport protocols (TCP, UDP, SCTP). An illustration of the protocol stack
can be seen in gure 2.
{ Random Sequence Number (RSN) - Random value computed by the client
before sending the initial message. This number will be a primitive session
identi er. It will be present only in the rst message, but it will be hashed
for the digital signature in the other messages following the initial message.
{ Host Identi er (HID) - A simple ID used for host identi cation. It is
generated as a hash from the host public key and the application speci c host
discriminator. In the future the HID could be generated from more data to
give a higher level of security.
{ Algorithm List (AL) - List of algorithms in the preferred order as a delimited
string. The algorithm list is divided by algorithm types.
{ Digital Signature (DS) - message hash encrypted with the senders private
key so that the message could be authenticated on the receiving side and
could not be changed without detection.</p>
      <p>The other host then replies with its own algorithm list, host identi er and digital
signature. After this step both sides know which protocol they will use. To
con rm this the initiating host sends an OK message to end the negotiation.
4.1</p>
      <sec id="sec-4-1">
        <title>Data structures</title>
        <p>Each ACNP side must have a data structure to hold the list of public keys of
other communicating hosts. The structure would be similar to the known hosts
le used in the SSH protocols for storing hosts with whom the client previously
communicated. The structure is lled on the rst communication with a host.
Two additional messages are exchanged as a part of the rst negotiation. This
two messages contain the initiating host public key and the other host
public key respectively. After this initial exchange the hosts can safely negotiate
cryptographic protocols.</p>
        <p>Host_ID1:Pub_key1: Alg_type1:Alg_choice1:Timeout</p>
        <p>Alg_type2:Alg_choice2:Timeout
.
.</p>
        <p>.</p>
        <p>Host_ID2:Pub_key2: Alg_type3:Alg_choice3:Timeout</p>
        <p>Alg_type2:Alg_choice4:Timeout
.
.</p>
        <p>.
This structure could also have the previously negotiated preferred protocols
to minimize the need to renegotiate protocols through time. The previously
negotiated algorithms could also be stored by the application using ACNP. An
example of the ACNP hosts data structure, with the record of previously
negotiated protocols, is shown in gure 3. The structure also has a Timeout value
which can be con gured in the implementation. The aim of the timeout value is
to enable renegotiation after a certain amount of time to enhance security and
change to a new cryptographic algorithm.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Hash and public key algorithms used to secure negotiation</title>
        <p>To secure the negotiation the messages need to be secured by using at least two
algorithms:
{ A hash algorithm to ensure integrity and generate host IDs
{ A public key algorithm that will be used for message signing</p>
        <p>For hashing messages the Secure Hash Algorithm that has a xed output of
256 bits is used (SHA-256). Host IDs will also be generated using the SHA-256
algorithm.</p>
        <p>For digital signatures the RSA algorithm is used and a minimal 2048 bit key
length must be used. Also the public host keys that are exchanged need to be
at least 2048 bit long. Host private and public key must be generated before
the rst negotiation. It is important to safely store the host private key to avoid
security breaches within the ACNP.</p>
        <p>In the future implementations the proposed hash and public key protocols
will be changed to more secure and up to date versions of the same protocols,
i.e. SHA3-256 for generating hashes and ECDSA-256 for public key encryption.</p>
        <p>Although the algorithms need to be changed in the future the negotiation
mechanism exchanges only three messages. This signi cantly prolongs packet
collection for a potential brute force attack against the cryptographic algorithms
used for negotiation.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Message formats</title>
        <p>{ Abort 1 :
{ Abort 2 :</p>
        <sec id="sec-4-3-1">
          <title>HIDC ; OK; EpubS(Hash(RSN + 2; HIDC ; OK))</title>
          <p>If the communicating sides can't agree on a cryptographic protocol two abort
messages are provided to replace the second and third message respectively:</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>HIDS; ABORT; EpubC (Hash(RSN + 1; HIDS; ABORT ))</title>
        </sec>
        <sec id="sec-4-3-3">
          <title>HIDC ; ABORT; EpubS(Hash(RSN + 2; HIDC ; ABORT ))</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Protocol and security considerations</title>
      <p>For the protocol to function properly the code regarding cryptographic
functions must be agile. Agile code only de nes a required cryptographic function
like hash, symmetric encryption or asymmetric encryption and enables dynamic
speci cation of algorithms that are to be used. This is the main prerequisite for
the ACNP to be e cient and deployable.</p>
      <p>An e cient way for fetching supported algorithms list is needed. The
supported algorithms list may depend on the operating system, programming
language and their currently used versions. Fetching mechanisms will di er based
on the OS and programming language. It is essential to create a fetching
procedure that enables the usage of new and enhanced versions of protocols after
system updates that a ect a systems ability to use security algorithms. ACNP
is by design independent of the operating system on which it is used.</p>
      <p>Depending on the transport protocol that is used the speci c
implementations need di erent approaches. A TCP session failure is easy to detect, whereas
an UDP communication needs to have timeouts to detect communication
problems. An UDP packet is easier to spoof than a message in a TCP session.</p>
      <p>Timeouts and connection limits should also be present to mitigate resource
attacks as system resources are needed to keep track of current negotiations.
Lower layer mechanisms could be used to prevent attack but that depends only
on the deployment environment. Replay attacks should be mitigated by treating
the random sequence number as a nonce eld and drop all packets that have
the same RSN eld as messages before. For that purpose all initial RSN values
should be stored.</p>
      <p>While the negotiation process is protected the initial public key exchange
still remains vulnerable to denial of service attacks. The attacker could change
the key along the way since the key exchange isn't protected.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>While creating an application a designer must take into account the security risks
of exposing data that is exchanged through the network. To mitigate these risks
cryptographic algorithms can be used. Most applications end up having xed
cryptographic algorithms or a badly implemented negotiation protocol. This
problem is solved by introducing the Agile cryptographic negotiation protocol
(ACNP) which enables the negotiation and introduction of new and updated
versions of cryptographic protocols. The ACNP uses the principles from the
SSH protocol which is widely deployed and tested. It translates those principles
into a peer to peer environment so that it can be used between any two nodes
for negotiating and introducing newly supported cryptographic algorithms.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Schneier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edn. John Wiley &amp; Sons, Inc., New York, NY, USA (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Arkko</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kempf</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zill</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nikander</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>SEcure Neighbor Discovery (SEND)</article-title>
          .
          <source>RFC 3971</source>
          , Internet Engineering Task Force (
          <year>March 2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.</given-names>
            <surname>Freier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Kocher</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          :
          <article-title>The Secure Sockets Layer (SSL) Protocol Version 3.0</article-title>
          . RFC 6101 (
          <string-name>
            <surname>Proposed</surname>
            <given-names>Standard)</given-names>
          </string-name>
          (
          <year>August 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dierks</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rescorla</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>The Transport Layer Security (TLS) Protocol version 1.2</article-title>
          . RFC 5246 (
          <string-name>
            <surname>Proposed</surname>
            <given-names>Standard)</given-names>
          </string-name>
          (
          <year>August 2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ylonen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lonvick</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>The Secure Shell (SSH) Protocol Architecture</article-title>
          .
          <source>RFC</source>
          <volume>4251</volume>
          (
          <string-name>
            <surname>Proposed</surname>
            <given-names>Standard)</given-names>
          </string-name>
          (
          <year>January 2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kent</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seo</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Security Architecture for the Internet Protocol</article-title>
          .
          <source>RFC 4301</source>
          ,
          <string-name>
            <surname>Internet</surname>
            <given-names>Engineering Task Force</given-names>
          </string-name>
          (
          <year>December 2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cheneau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laurent</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vanderveen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Signature Algorithm Agility in the Secure Neighbor Discovery (SEND) Protocol. draft-cheneau-csi-</article-title>
          <string-name>
            <surname>send-</surname>
          </string-name>
          sigagility-
          <volume>02</volume>
          (
          <year>June 2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Vasic</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kukec</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikuc</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Deploying new hash algorithms in secure neighbor discovery</article-title>
          .
          <source>In: Software, Telecommunications and Computer Networks (SoftCOM)</source>
          ,
          <year>2011</year>
          19th International Conference on.
          <source>(September</source>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ylonen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lonvick</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>The Secure Shell (SSH) Transport Layer Protocol</article-title>
          .
          <source>RFC</source>
          <volume>4253</volume>
          (
          <string-name>
            <surname>Proposed</surname>
            <given-names>Standard)</given-names>
          </string-name>
          (
          <year>January 2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Petkac</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Badger</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morrison</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Security agility for dynamic execution environments</article-title>
          .
          <source>DARPA Information Survivability Conference and Exposition</source>
          ,
          <volume>1</volume>
          (
          <year>2000</year>
          )
          <fpage>0377</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Petkac</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Badger</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Security agility in response to intrusion detection</article-title>
          .
          <source>In: Proceedings of the 16th Annual Computer Security Applications Conference. ACSAC '00</source>
          , Washington, DC, USA, IEEE Computer Society (
          <year>2000</year>
          )
          <volume>11</volume>
          {
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. T. Acar,
          <string-name>
            <given-names>M.</given-names>
            <surname>Belenkiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          , and
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Ellison: Key Management In Distributed Systems (</article-title>
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Bellovin</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rescorla</surname>
            ,
            <given-names>E.K.</given-names>
          </string-name>
          :
          <article-title>Deploying a new hash algorithm</article-title>
          . (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Tarman</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hutchinson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pierson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sholander</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wirzke</surname>
          </string-name>
          , E.:
          <article-title>Algorithmagile encryption in atm networks</article-title>
          .
          <source>Computer</source>
          <volume>31</volume>
          (
          <issue>9</issue>
          ) (sep
          <year>1998</year>
          )
          <volume>57</volume>
          {
          <fpage>64</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Paar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetwynd</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Connor</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deng</surname>
            ,
            <given-names>S.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marchant</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An algorithmagile cryptographic co-processor board on fpgas</article-title>
          .
          <source>PROCEEDINGS- SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING</source>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Mikuc</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasic</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brcina</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovacevic</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maric</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marini</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pokornic</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veznaver</surname>
          </string-name>
          , R.:
          <article-title>NgP agreement protocol (croatian)</article-title>
          .
          <source>(May</source>
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Arkko</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nikander</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Weak authentication: How to authenticate unknown principals without trusted parties</article-title>
          . In Christianson,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Crispo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Malcolm</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Roe</surname>
          </string-name>
          , M., eds.:
          <source>Security Protocols. Volume 2845 of Lecture Notes in Computer Science</source>
          . Springer Berlin / Heidelberg (
          <year>2004</year>
          )
          <volume>57</volume>
          {
          <fpage>66</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>