Annulleret

Create a simulator

Hi ,

Basically, I need a simulator that able to read and run the communication protocols (mainly target on authentication) from user and allow user to run a series of attacks on it to analyse if the protocol is vulnerable or not.

- user is required to select how numbers of parties would be involve in the "communication" and identify it with an alphabet. i.e. "A", "B", "T" etc..

- user will input a [url removed, login to view] file with protocols written in it. (according to the simulator definition)

- simulator able to read in definition and represent each of the parties (A, B, T...) with an object and communicate with each other.

- GUI that shows the protocol is running step by step.

- user can input another [url removed, login to view] file that include how to trigger the attacks (modify, replace, delete, intercept), on which line or sequence, etc...

- results shown, if the attack works or not.

That's what I have been thinking of... I am not sure if it would work or not as I am not familiar with this field. I would welcome any suggestions as you have more experiences in this.

Pls check the file attached in the link

[url removed, login to view]

--

Regards,

tutorapex

Bid for lowest amount

Simulation of Security Protocols

The objective of this project is to develop a security protocols simulator that aids the analyst/user to test/analyse the security protocols by running a series of attacks. The main purpose of a simulator is to search for security flaws (which can be exploited by an intruder) and unpredictable situations that usually expected to be discovered.

The security protocols notation specifies only the operation and not its semantics – for instance, public key encryption and signature are represented identically. (Looking at the high level of security protocols only – assuming the encryption is secure)

The application must be able to:

· Allow user to input a text file that contain the security protocols notations. (users must write according to the specific protocol description language that defined by the application itself)

· Read in definition of the security protocols.

· Repetition of the security protocols steps will get an error.

· Check if it is a valid security protocols.

· Run the security protocols that defined by the users.

· Allow users to input another text file that contain the attacks protocols (use to trigger the attacks according to the sequences)

· Providing log of the event (if the attack is successful)

· Programming Language: Java Developer

Extra information

I have decided the protocols description language to use for the application. It is shown as below (something similar)

Message 1 A->B: A.K(A)

Message 2 B->A: B.K(B)

Message 3 A->B: {K(AB)}K(B)

Message 4 B->A: {K(AB)}K(A)

Principals = A and B, -> = Entity1 sending a message to Entity2, Public Keys = K(A) and K(B), Symmetric Key = K(AB), Encrypted with A’s public key = {} K(A), Encrypted with B’s public key = {} K(B).

I am thinking about adding a GUI to show the process of the protocols as well. I do roughly understand it needs parsing, string tokenizer, and array to do the job.

Evner: C programmering, Cisco, Indbygget Software, J2EE, Java

Se mere: other experiences, java read zip file, dropbox definition, a b, vulnerable, create e, attack s, analyse, read file gui java, dropbox simulator, link file dropbox, user analyse, create java object, create text, protocol java protocol, read text file java gui, java input field, text gui java, gui simulator java, java gui read text file, create check file, user input java gui, read text file gui java, java gui text, intercept http

Om arbejdsgiveren:
( 359 bedømmelser ) Mutrah, Oman

Projekt ID: #608392

7 freelancere byder i gennemsnit $81 på dette job

talluriamara

hi i can do this [login to view URL] check pmb

$70 USD in 5 dage
(3 bedømmelser)
4.0
kspollux

Hi, please check PM. Thanks & Regards.

$99 USD in 2 dage
(2 bedømmelser)
3.1
J711

Hi, I am ready to start to work with your project.

$50 USD in 5 dage
(1 bedømmelse)
2.5
duymap

I can finish it in 5 days.

$100 USD in 5 dage
(1 bedømmelse)
0.0
dinhero

I can realize this project, please consult my PM

$100 USD in 2 dage
(1 bedømmelse)
0.0
gupring

hi i can do [login to view URL] we start.

$45 USD in 5 dage
(0 bedømmelser)
0.0
jaroslaw84

I have experience of cryptografy for over 5 years, i know what to use and how, let me do this!.

$100 USD in 2 dage
(0 bedømmelser)
0.0