Security Protocols and Infrastructures. Winter Term 2012/2013
|
|
- Ashlie Flowers
- 7 years ago
- Views:
Transcription
1 Security Protocols and Infrastructures Winter Term 2012/2013 Harald Baier Chapter 4: Introduction to Abstract Syntax Notation 1 ASN.1 The key ASN.1 structure of the lecture: Certificates Certificate ::= SEQUENCE { tbscertificate TBSCertificate, signaturealgorithm AlgorithmIdentifier, signaturevalue BIT STRING } TBSCertificate ::= SEQUENCE { version [0] EXPLICIT Version DEFAULT v1, serialnumber CertificateSerialNumber, signature AlgorithmIdentifier, issuer Name, validity Validity, subject Name, subjectpublickeyinfo SubjectPublicKeyInfo, issueruniqueid [1] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version shall be v2 or v3 subjectuniqueid [2] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version shall be v2 or v3 extensions [3] EXPLICIT Extensions OPTIONAL -- If present, version shall be v3 } Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 2
2 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 4
3 ASN.1 basics ASN.1 = Abstract Syntax Notation One Objectives: Abstract description of data objects at the application layer (according to ISO-OSI reference model) Syntax is similar to higher programming languages Very flexible Coding is typically implemented using Basic Encoding Rules (BER) or Distinguished Encoding Rules (DER) Standard: ITU-T X.680, Specification of ASN.1, Nov Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Four ASN.1 type classes Simple types: Atomic (i.e. do not comprise components) Examples: INTEGER, BIT STRING, UTCTime Structured types: Possess components Examples: SET, SEQUENCE Tagged types: Derived from other types Implicit vs. explicit tagging mode Other Types: Examples: CHOICE, ANY Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 6
4 ASN.1 notation (1/2) Comment: Starts after two hyphens '--' Ends either at end of line or at two hyphens '--' Notation of variables and types: Allowed characters: A-Z, a-z, 0-9, -, 'SPACE' Variables begin with a lowercase Types begin with an uppercase Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 notation (2/2) Assigning operator: a ::= b Define a by b Declaration of variables: nameofvariable Type Example: b INTEGER b is an INTEGER Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 8
5 ASN.1 tags Every ASN.1 type (besides CHOICE, ANY) has a universal tag (is needed in encoding to define the ASN.1 type) Every tag comprises a tag class and a tag number Notation: [ <class> <tag number> ] Default tag (if class is omitted): context specific Do not confuse: A tag to define a universal type and A tagged type There are four tag classes Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Four ASN.1 tag classes (1/2) Universal tags: Meaning is standardised and the same within each application Key word: UNIVERSAL Application specific tags (not relevant for us): Meaning not standardised; depends on application context Key word: APPLICATION Example: Database vs. office application The same tag number has different implications Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
6 Four ASN.1 tag classes (2/2) Private tags (not relevant for us): Self-defined and only valid within proprietary environment Key word: PRIVATE Context-specific tags: Meaning depends on the context, where the tag is used Typically used within structured types to avoid ambiguity Most important tag class for certificates No key word Default tag, if key word is missing Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 Simple Types Type Universal Details Tag BOOLEAN 1 Values are TRUE or FALSE INTEGER 2 An integer BIT STRING 3 A string of 0 and 1 OCTET STRING 4 A string of bytes NULL 5 No information available OBJECT IDENTIFIER 6 A reference of an object PrintableString 19 A string of printable characters IA5String 22 A string of ASCII characters UTCTime 23 Coordinated Universal Time (GMT) GeneralizedTime 24 Generalized Time (GMT) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
7 4 Classes of Structured Types SEQUENCE (Universal Type 16): Ordered set of one or more types SEQUENCE OF (Universal Type 16): Ordered set of 0,...,N instances of the same type SET (Universal Type 17): Unordered set of one or more types SET OF (Universal Type 17): Unordered set of 0,...,N instances of the same type Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Sample Types and Tags Definition of a simple type by its tag: [ UNIVERSAL 2 ] : INTEGER [ UNIVERSAL 6 ] : OBJECT IDENTIFIER Definition of a structured type by its tag: [ UNIVERSAL 16 ] : SEQUENCE [ UNIVERSAL 17 ] : SET Definition of a tagged-type: [ 0 ] : Context specific tag number 0 Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
8 Time notation in ASN.1 2 simple types to denote the time UTCTime : Coordinated Universal Time Format: YYMMDDHHMMSSZ Z : Zulu = GMT YY 50: Year = 19YY YY < 50: Year = 20YY GeneralizedTime : Format: YYYYMMDDHHMMSSZ Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Tagged Types Use case: Avoid ambiguity in a structered type Typically optional types in a SEQUENCE Two or more instances of the same type in a SET 2 methods of tagging: Explicit tagging: New tag is a wrapper of the old tag Notation: [ class number ] EXPLICIT Default tagging method, if key word is missing Implicit tagging: New tag overrides the old tag Notation: [ class number ] IMPLICIT Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
9 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 encoding methods Encoding method: Defines how to write an ASN.1 structure as a bit string Scheme: Type - Length Value (TLV) Type: Defines the ASN.1 type to encode Length: Represents the length of value Value: Actual contents Relevant encoding methods of ASN.1 structures: Basic Encoding Rules (BER) Distinguished Encoding Rules (DER): A subset of BER Privacy Enhanced Mail Coding (PEM): Default in openssl Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
10 3 BER encoding forms Primitive form: Length of value is known Example: Simple type, which is not a string (BOOLEAN, OBJECT IDENTIFIER, INTEGER,...) Constructed form: Length of value is known Examples: Simple string type, structured type Length of value is not known Examples: Simple string type, structured type Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding parts BER encoding comprises three or four parts (TLV): Identifier: Encodes the ASN.1 type Length: Describes the length of value (if known) Value: Encoded Value End-of-contents: End of encoded value, if its length is unknown Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
11 BER encoding of the identifier (1/3) Notation of the first identifier byte: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 Bits b 7 b 6 define the ASN.1 tag class: b 7 b 6 = 00 : UNIVERSAL b 7 b 6 = 01 : APPLICATION b 7 b 6 = 10 : context-specific b 7 b 6 = 11 : PRIVATE Bit b 5 defines the encoding form: b 5 = 0 : Primitive form (i.e. length is known) b 5 = 1 : Constructed form (length known or not) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding of the identifier (2/3) Bits b 4 b 3 b 2 b 1 b 0 define the value of the tag: b 4 b 3 b 2 b 1 b 0 < : Bit string represents the tag number in big-endian Tag numbers 0,..., 30 can be represented in this form b 4 b 3 b 2 b 1 b 0 = : Tag number is encoded in the following bytes Every relevant byte for the tag number starts with a '1' The last tag number byte starts with a '0' Ignore the most significant bit of these bytes to get the actual tag number Typically does not happen in our context Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
12 BER encoding of the identifier (3/3) Source: Olivier Dubuisson, ASN.1 Communication between Heterogeneous Networks Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding of the length (1/2) Notation of the first length byte: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 Bit b 7 = 0: Short definite length Value requires b 6 b 5 b 4 b 3 b 2 b 1 b 0 bytes (written in binary) Maximum length of value: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 = = 127 Bit b 7 = 1: Long definite length or indefinite length b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 = : Indefinite length Otherwise b 6 b 5 b 4 b 3 b 2 b 1 b 0 defines the following number of bytes to encode the length of value Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
13 BER encoding of the length (2/2) Source: Olivier Dubuisson, ASN.1 Communication between Heterogeneous Networks Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER vs. DER Drawback of BER BER does not require a specific encoding form, if multiple encodings are possible (e.g. for string types) Ambiguity of encoding is possible for the same input of raw data If a digital signature is computed over this raw data, the signature is not unique Solution: Use Distinguished Encoding Rules (DER) A subset of BER Deterministic enoding of raw data Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
14 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo Hex dump of a certificate of the German Federal Network Agency Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
15 ASN.1-Demo: Identifier of first ASN.1 variable ASN.1 type of the first ASN.1 variable is encoded within the identifier Byte number 0: Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Bit string: ASN.1 type: Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Length of value of first ASN.1 variable The length of the first ASN.1 value is encoded after the identifier: Byte number : Corresponding bit string: The length is encoded in the following bytes!! Actual length of the value in bytes (octets) to : In hex: Decimal: Comparison to the length of the file: $ ls -l BNetA-10R-CA-s42.cer -rw baier baier Nov 13:25 BNetA-10R-CA-s42.cer Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
16 ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Byte = Length: Byte : Corresponding bit string: The length is encoded again in the following bytes!! Actual length of the value in bytes (octets) to : In hex: Decimal: Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte : Actual length of the value is bytes Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
17 ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte is Value is encoded in octet : Context-specific tag ends here Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte is Value is encoded in octet : INTEGER ends here Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
18 ASN.1-Demo: openssl asn1parse openssl asn1parse shows ASN.1 structure of certificate (take care of the input encoding form using the switch inform ) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/
Prepared By: P0209337 Lichen. P0209259 Xulu
Local Certificate Authority Prepared By: P0209337 Lichen P0209259 Xulu 1 2 Abstract Today, security of information is most important in the Internet; for example, electronic commerce and electronic government
More informationWhat Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison
What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose
More informationSecurity Issues of the Digital Certificates within Public Key Infrastructures
16 Security Issues of the Digital Certificates within Public Key Infrastructures Cristian TOMA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.toma@ie.ase.ro The
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationTowards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland
Towards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland Table of Contents Motivation ^2G and 3G Cellular Networks ^ IEEE 802.11
More informationAbstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One
Kommunikationssysteme (KSy) - Block 7 Abstract Syntax Notation One ASN.1 Dr. Andreas Steffen 2000-2002 A. Steffen, 22.01.2002, KSy_ASN1.ppt 1 ASN.1 Abstract Syntax Notation One Standards and applications
More informationPackage PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
More informationPackage PKI. February 20, 2013
Package PKI February 20, 2013 Version 0.1-1 Title Public Key Infrastucture for R based on the X.509 standard Author Maintainer Depends R (>=
More informationpublic key version 0.2
version 0.2 Typeset in L A TEX from SGML source using the DocBuilder-0.9.8.4 Document System. Contents 1 User s Guide 1 1.1 Introduction.......................................... 1 1.1.1 Purpose........................................
More informationSNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
More informationCommon Secure Interoperability Version 2 CSI v2
Common Secure Interoperability Version 2 CSI v2 A User s View by Don Flinn The Specification Team Compaq Concept Five Gemstone Hewlett Packard IBM Inprise IONA/OOC Oracle Persistence Promia SUN Syracuse/Adiron
More informationChapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
More informationMTAT.07.017 Applied Cryptography
MTAT.07.017 Applied Cryptography Public Key Infrastructure (PKI) Public Key Certificates (X.509) University of Tartu Spring 2015 1 / 42 The hardest problem Key Management How to obtain the key of the other
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.691 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationLecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm. Lecture Notes on Computer and Network Security
Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) February 26, 2015 2:48pm c 2015 Avinash
More informationBiometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationDesign and Implementation of LDAP Component Matching for Flexible and Secure Certificate Access in PKI
Design and Implementation of LDAP Matching for Flexible and Secure Certificate Access in PKI Sang Seok Lim IBM Watson Research Center P.O. Box 218 Yorktown Heights, NY 10598 slim@us.ibm.com Jong Hyuk Choi
More informationRaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL
RaneNote : SIMPLE? NETWORK MANAGEMENT PROTOCOL : Simple? Network Management Protocol Overview The Message Format The Actual Bytes Douglas Bruey Rane Corporation RaneNote 161 2005 Rane Corporation Introduction
More informationAlternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS
Alternate Representations of the Public Key Cryptography Standards (PKCS Using S-Expressions, S-PKCS Matthew D. Wood Carl M. Ellison Intel Security Technology Lab Alternate Representations of the Public
More informationDetailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
More informationNISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
More informationPemrograman Dasar. Basic Elements Of Java
Pemrograman Dasar Basic Elements Of Java Compiling and Running a Java Application 2 Portable Java Application 3 Java Platform Platform: hardware or software environment in which a program runs. Oracle
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents
Technical Guideline TR-03110-3 Advanced Security Mechanisms for Machine Readable Travel Documents Part 3 Common Specifications Version 2.10 20. March 2012 History Version Date Comment 1.00 2006-02-08 Initial
More informationCommon Security Protocol (CSP) ACP 120. June 1998
Common Security Protocol (CSP) ACP 120 June 1998 UNCLASSIFIED I ORIGINAL (Reverse Blank) Foreword 1. ACP120, COMMON SECURITY PROTOCOL, is an UNCLASSIFIED publication. Periodic accounting is not required.
More informationpublic_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015
public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015 Copyright 2008-2015 Ericsson AB, All Rights Reserved Licensed under the Apache License, Version 2.0 (the
More informationA New On-line Certificate Validation Method using LDAP Component Matching Technology
A New On-line Certificate Validation Method using LDAP Component Matching Technology Jong Hyuk Choi, Sang Seok Lim, and Kurt D. Zeilenga Abstract This paper presents a new on-line certificate validation
More informationCOMMON PKI SPECIFICATIONS FOR INTEROPERABLE APPLICATIONS FROM T7 & TELETRUST SPECIFICATION INTRODUCTION
COMMON PKI SPECIFICATIONS FOR INTEROPERABLE APPLICATIONS FROM T7 & TELETRUST SPECIFICATION INTRODUCTION VERSION 2.0 20 JANUARY 2009 Common PKI: Introduction Version 2.0 Contact Information The up-to-date
More informationPL / SQL Basics. Chapter 3
PL / SQL Basics Chapter 3 PL / SQL Basics PL / SQL block Lexical units Variable declarations PL / SQL types Expressions and operators PL / SQL control structures PL / SQL style guide 2 PL / SQL Block Basic
More informationBachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
More informationThe New IoT Standard: Any App for Any Device Using Any Data Format. Mike Weiner Product Manager, Omega DevCloud KORE Telematics
The New IoT Standard: Any App for Any Device Using Any Data Format Mike Weiner Product Manager, Omega DevCloud KORE Telematics About KORE The world s largest M2M/IoT services provider 12 Carriers Enterprise
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
More informationConfiguring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
More informationSNMP SMI Structure of Management Information
SNMP SMI Structure of Management Information Network Mgmt/Sec. 1 Outline ASN.1 short intro BER grammar/types SMI types and application types MACROs tables/examples 2 jrb comment: this will seem like much
More informationA PKI case study: Implementing the Server-based Certificate Validation Protocol
54 ISBN: 978-960-474-048-2 A PKI case study: Implementing the Server-based Certificate Validation Protocol MARIUS MARIAN University of Craiova Department of Automation ROMANIA marius.marian@cs.ucv.ro EUGEN
More informationThe Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
More informationmod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
More informationSystem and Network Management
- System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!
More informationTechnical description of X.509 and UN/EDIFACT certificates. Specific user requirements on certificate data elements mapping
Technical description of X.509 and UN/EDIFACT certificates. Specific user requirements on certificate data elements mapping Montserrat Rubia, UPC Juan Carlos Cruellas, UPC Manel Medina, UPC Isabel Gallego,
More informationImporting Lease Data into Forms Online
Blue Moon Software presents May 2012 Importing Lease Data into Forms Online A Developer's Guide Edited by Michael Phillipson wwwbluemooncom Table of Contents XML and the Blue Moon DTD 1 Login Data1 Login
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationMemory is implemented as an array of electronic switches
Memory Structure Memory is implemented as an array of electronic switches Each switch can be in one of two states 0 or 1, on or off, true or false, purple or gold, sitting or standing BInary digits (bits)
More informationCSI 333 Lecture 1 Number Systems
CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...
More informationTechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
More informationNuance Mobile Developer Program. HTTP Services for Nuance Mobile Developer Program Clients
Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Notice Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Copyright 2011
More informationInternationalizing the Domain Name System. Šimon Hochla, Anisa Azis, Fara Nabilla
Internationalizing the Domain Name System Šimon Hochla, Anisa Azis, Fara Nabilla Internationalize Internet Master in Innovation and Research in Informatics problematic of using non-ascii characters ease
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationSection 4: Interim Local Management Interface Specification
Section 4: Interim Local Management Interface Specification 105 ATM USER-NETWORK INTERFACE SPECIFICATION (V3.1) Scope Whereas the ITU-T and ANSI standards committees have been working to define both C-plane
More informationVariables, Constants, and Data Types
Variables, Constants, and Data Types Primitive Data Types Variables, Initialization, and Assignment Constants Characters Strings Reading for this class: L&L, 2.1-2.3, App C 1 Primitive Data There are eight
More informationInformation Systems Security Management
Information Systems Security Management Gerald Quirchmayr, Edgar Weippl, Oliver Jorns Fakultät für Wirtschaftswissenschaften und Informatik Liebiggasse 4/3-4, 1010 Wien Tel. +43-1-4277-38431 Fax +43-1-4277-38449
More informationThe programming language C. sws1 1
The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan
More informationNumber of bits needed to address hosts 8
Advanced Subnetting Example 1: Your ISP has assigned you a Class C network address of 198.47.212.0. You have 3 networks in your company with the largest containing 134 hosts. You need to figure out if
More informationComputer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
More informationIntroduction to Python
Caltech/LEAD Summer 2012 Computer Science Lecture 2: July 10, 2012 Introduction to Python The Python shell Outline Python as a calculator Arithmetic expressions Operator precedence Variables and assignment
More informationCaml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationGrid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
More informationInteroperability Guidelines for Digital Signature Certificates issued under Information Technology Act
for Digital Signature Certificates issued under Information Technology Act Version 2.4 December 2009 Controller of Certifying Authorities Department of Information Technology Ministry of Communications
More information1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
More informationNumber Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
More informationType 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31
Type 2 Tag Operation Specification Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 RESTRICTIONS ON USE This specification is copyright 2005-2011 by the NFC Forum, and
More informationASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6)
ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6) 1 COMPUTER LANGUAGES In order for a computer to be able to execute a program, the program must first be present
More informationCharacter Code Structure and Extension Techniques
Standard ECMA-35 6th Edition - December 1994 Standardizing Information and Communication Systems Character Code Structure and Extension Techniques Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - X.400:
More informationSimple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science
Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science 1 Outline Background SNMP Basics SNMP Version 1 SNMP Version 2 SNMP Management,
More informationPKI and OpenSSL part 1 X.509 from the user s and the client software s point of view
PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view Version 0.5 Richard Levitte, mailto:levittelp.se November 18, 2003 A serie of lectures PKI and OpenSSL part 1: codex.509
More informationPacket Structure and Encoding
Packet Structure and Encoding Network Layer details Application Layer details Abstract Syntax Notation One (ASN.1) Encoding Application Services and Properties Context Specific and Application Tags Primitive
More informationHL7 Conformance Statement
HL7 Conformance Statement Release VA20B (2014-03-28) ITH icoserve technology for healthcare GmbH Innrain 98, 6020 Innsbruck, Austria +43 512 89059-0 www.ith-icoserve.com Any printout or copy of this document
More informationVisa/MasterCard Secure Electronic Transactions (SET) Scope of SET Protocols
Visa/MasterCard Secure Electronic Transactions (SET) Specification of the Official method of achieving network payment via Credit Cards Announced in February 1996 Supported by Visa, MasterCard, GTE, IBM,
More informationETSI TS 102 280 V1.1.1 (2004-03)
TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,
More informationHP Service Virtualization
HP Service Virtualization Fixed Length Protocol Virtualization SV Training September 2014 Fixed Length Protocol Virtualization Technology Description Use Cases Supported Message Structures SV Service Description
More informationAPPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
More information2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
More informationHandout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner.
Handout 1 CS603 Object-Oriented Programming Fall 15 Page 1 of 11 Handout 1 Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Java
More informationThe Hexadecimal Number System and Memory Addressing
APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to
More informationPublic Key Infrastructures. Andreas Hülsing
Public Key Infrastructures Andreas Hülsing X.509 Revocation 17-11-2015 PAGE 1 Certificate revocation Abortive ending of the binding between subject and key (public key certificate) OR subject and attributes
More informationFINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION
THE UNIVERSITY OF TRINIDAD & TOBAGO FINAL ASSESSMENT/EXAMINATION JULY 2015 Course Code and Title: CNET 2001 Network Architecture Programme: B.A.Sc. ICT Computer Engineering Date: Tuesday July 28, 2015
More informationConfiguration of the DHCP server
104 Page 91 of 294 Contents This section contains information on the following topics: Overview................................................ 91 i2004 Internet Telephone....................................
More informationLecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
More information8 Tutorial: Using ASN.1
8 Tutorial: Using ASN.1 Data Types This tutorial describes how to use ASN.1 types and values in the SDL suite. You will learn how to import and use ASN.1 modules in your SDL diagrams, how to generate code
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
More informationCore Components Data Type Catalogue Version 3.1 17 October 2011
Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business
More informationNEW SOUTH WALES DEPARTMENT OF TRANSPORT. Transport Services Division. Driver Authority Information Service E-Mail Format Specification
NEW SOUTH WALES DEPARTMENT OF TRANSPORT. Transport Services Division Driver Authority Information Service E-Mail Format Specification 20 May 1999 TABLE OF CONTENTS 1 Introduction... 3 2 Definitions...
More informationName: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
More informationUseful Number Systems
Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2
More informationJapannext PTS ITCH Market Data Specification. Version 1.4 Updated 3 October 2014
Japannext PTS ITCH Market Data Specification Version 1.4 Updated 3 October 2014 Table of Contents 1. Introduction... 3 2. Overview... 3 3. Data Types... 3 4. Outbound Sequenced Messages... 3 4.1 Seconds...
More information2.1 The scope of Time Stamping Protocol (TSP)
XML Security Time Stamping Protocol Axelle Apvrille Vincent Girier Storage Technology European Operations 1 Rd Point Général Eisenhower 31106 Toulouse, France Axelle Apvrille,Vincent Girier @storagetek.com
More informationApache Cassandra Query Language (CQL)
REFERENCE GUIDE - P.1 ALTER KEYSPACE ALTER TABLE ALTER TYPE ALTER USER ALTER ( KEYSPACE SCHEMA ) keyspace_name WITH REPLICATION = map ( WITH DURABLE_WRITES = ( true false )) AND ( DURABLE_WRITES = ( true
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationDATEVe:secure MAIL V1.1. ISIS-MTT-Assessment Report
DATEVe:secure MAIL V1.1 DATEV eg ISIS-MTT-Assessment Report Version 1.1 Date 08. July 2004 Hans-Joachim Knobloch, Fritz Bauspiess Secorvo Security Consulting GmbH Albert-Nestler-Straße 9 D-76131 Karlsruhe
More informationUtility Software II lab 1 Jacek Wiślicki, jacenty@kis.p.lodz.pl original material by Hubert Kołodziejski
MS ACCESS - INTRODUCTION MS Access is an example of a relational database. It allows to build and maintain small and medium-sized databases and to supply them with a graphical user interface. The aim of
More informationAN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
More informationDisplaying SSL Certificate and Key Pair Information
CHAPTER 6 Displaying SSL Certificate and Key Pair Information This chapter describes the show commands available for displaying SSL-related information, such as certificate signing request (CSR) parameter
More informationToday s topics. Digital Computers. More on binary. Binary Digits (Bits)
Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro
More informationMoving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
More informationJapanese Character Printers EPL2 Programming Manual Addendum
Japanese Character Printers EPL2 Programming Manual Addendum This addendum contains information unique to Zebra Technologies Japanese character bar code printers. The Japanese configuration printers support
More informationCHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It
CHAPTER 5 5.1. Introduction Obfuscation is a process of converting original data into unintelligible data. It is similar to encryption but it uses mathematical calculations or programming logics. Encryption
More informationSignalling Control System Serial Train Information Interface
Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for
More informationEmail, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
More informationAn XML Alternative for Performance and Security: ASN.1
Web Services An XML Alternative for Performance and Security: ASN.1 Darren Mundy and David W. Chadwick Performance tests of XML and ASN.1 found that signed complex XML messages can be up to 1,000-percent
More informationChapter 9 Network Management
Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More information