ABSTRACT:
With the increase in security breaches and hacks, there is a need to have stronger cryptographic protocols, one which is able to prove more difficult for an attacker. The fields of Game-Theory and Cryptography are similar in their approach in dealing with parties who wish to follow a set of rules known as a protocol, which guides the affair of the environment where they engage. However, they differ in their approach to how the parties engage the protocol. Game theory deals with rationally distrusting players, with an incentive to follow the protocol, if only they have something to gain, while Cryptography similarly, deals with players, who have something to obtain from following the protocol, whether positively or negatively. The recent combination of both fields has been motivated by the desire to develop more realistic models (or protocols) for their interactions. In this research, we designed and implemented a game-theoretic-based model for a cryptographic protocol, providing real-life applicability of game-theory approaches to the numerous cryptographic protocols.
Keywords: Game theory, Cryptography, Security Game, Adversarial