Abstract:
There are a large amount of programs in the development process in todays
technology environment, and many of these involve some type of
security needs. These needs are usually not dealt with in a sensible way
and some even don’t bother with any analysis. This thesis describes a solution
of implementing a secure protocol, and gives an evaluation of the
process along with the techniques and tools to aid a secure design and
implementation process. This allows others to take this knowledge into
account when building other applications which have a need for security
development.