Security Protocols and Infrastructures. Winter Term 2012/2013

Size: px
Start display at page:

Download "Security Protocols and Infrastructures. Winter Term 2012/2013"

Transcription

1 Security Protocols and Infrastructures Winter Term 2012/2013 Harald Baier Chapter 4: Introduction to Abstract Syntax Notation 1 ASN.1 The key ASN.1 structure of the lecture: Certificates Certificate ::= SEQUENCE { tbscertificate TBSCertificate, signaturealgorithm AlgorithmIdentifier, signaturevalue BIT STRING } TBSCertificate ::= SEQUENCE { version [0] EXPLICIT Version DEFAULT v1, serialnumber CertificateSerialNumber, signature AlgorithmIdentifier, issuer Name, validity Validity, subject Name, subjectpublickeyinfo SubjectPublicKeyInfo, issueruniqueid [1] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version shall be v2 or v3 subjectuniqueid [2] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version shall be v2 or v3 extensions [3] EXPLICIT Extensions OPTIONAL -- If present, version shall be v3 } Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 2

2 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 4

3 ASN.1 basics ASN.1 = Abstract Syntax Notation One Objectives: Abstract description of data objects at the application layer (according to ISO-OSI reference model) Syntax is similar to higher programming languages Very flexible Coding is typically implemented using Basic Encoding Rules (BER) or Distinguished Encoding Rules (DER) Standard: ITU-T X.680, Specification of ASN.1, Nov Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Four ASN.1 type classes Simple types: Atomic (i.e. do not comprise components) Examples: INTEGER, BIT STRING, UTCTime Structured types: Possess components Examples: SET, SEQUENCE Tagged types: Derived from other types Implicit vs. explicit tagging mode Other Types: Examples: CHOICE, ANY Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 6

4 ASN.1 notation (1/2) Comment: Starts after two hyphens '--' Ends either at end of line or at two hyphens '--' Notation of variables and types: Allowed characters: A-Z, a-z, 0-9, -, 'SPACE' Variables begin with a lowercase Types begin with an uppercase Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 notation (2/2) Assigning operator: a ::= b Define a by b Declaration of variables: nameofvariable Type Example: b INTEGER b is an INTEGER Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/2013 8

5 ASN.1 tags Every ASN.1 type (besides CHOICE, ANY) has a universal tag (is needed in encoding to define the ASN.1 type) Every tag comprises a tag class and a tag number Notation: [ <class> <tag number> ] Default tag (if class is omitted): context specific Do not confuse: A tag to define a universal type and A tagged type There are four tag classes Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Four ASN.1 tag classes (1/2) Universal tags: Meaning is standardised and the same within each application Key word: UNIVERSAL Application specific tags (not relevant for us): Meaning not standardised; depends on application context Key word: APPLICATION Example: Database vs. office application The same tag number has different implications Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

6 Four ASN.1 tag classes (2/2) Private tags (not relevant for us): Self-defined and only valid within proprietary environment Key word: PRIVATE Context-specific tags: Meaning depends on the context, where the tag is used Typically used within structured types to avoid ambiguity Most important tag class for certificates No key word Default tag, if key word is missing Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 Simple Types Type Universal Details Tag BOOLEAN 1 Values are TRUE or FALSE INTEGER 2 An integer BIT STRING 3 A string of 0 and 1 OCTET STRING 4 A string of bytes NULL 5 No information available OBJECT IDENTIFIER 6 A reference of an object PrintableString 19 A string of printable characters IA5String 22 A string of ASCII characters UTCTime 23 Coordinated Universal Time (GMT) GeneralizedTime 24 Generalized Time (GMT) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

7 4 Classes of Structured Types SEQUENCE (Universal Type 16): Ordered set of one or more types SEQUENCE OF (Universal Type 16): Ordered set of 0,...,N instances of the same type SET (Universal Type 17): Unordered set of one or more types SET OF (Universal Type 17): Unordered set of 0,...,N instances of the same type Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Sample Types and Tags Definition of a simple type by its tag: [ UNIVERSAL 2 ] : INTEGER [ UNIVERSAL 6 ] : OBJECT IDENTIFIER Definition of a structured type by its tag: [ UNIVERSAL 16 ] : SEQUENCE [ UNIVERSAL 17 ] : SET Definition of a tagged-type: [ 0 ] : Context specific tag number 0 Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

8 Time notation in ASN.1 2 simple types to denote the time UTCTime : Coordinated Universal Time Format: YYMMDDHHMMSSZ Z : Zulu = GMT YY 50: Year = 19YY YY < 50: Year = 20YY GeneralizedTime : Format: YYYYMMDDHHMMSSZ Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ Tagged Types Use case: Avoid ambiguity in a structered type Typically optional types in a SEQUENCE Two or more instances of the same type in a SET 2 methods of tagging: Explicit tagging: New tag is a wrapper of the old tag Notation: [ class number ] EXPLICIT Default tagging method, if key word is missing Implicit tagging: New tag overrides the old tag Notation: [ class number ] IMPLICIT Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

9 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1 encoding methods Encoding method: Defines how to write an ASN.1 structure as a bit string Scheme: Type - Length Value (TLV) Type: Defines the ASN.1 type to encode Length: Represents the length of value Value: Actual contents Relevant encoding methods of ASN.1 structures: Basic Encoding Rules (BER) Distinguished Encoding Rules (DER): A subset of BER Privacy Enhanced Mail Coding (PEM): Default in openssl Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

10 3 BER encoding forms Primitive form: Length of value is known Example: Simple type, which is not a string (BOOLEAN, OBJECT IDENTIFIER, INTEGER,...) Constructed form: Length of value is known Examples: Simple string type, structured type Length of value is not known Examples: Simple string type, structured type Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding parts BER encoding comprises three or four parts (TLV): Identifier: Encodes the ASN.1 type Length: Describes the length of value (if known) Value: Encoded Value End-of-contents: End of encoded value, if its length is unknown Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

11 BER encoding of the identifier (1/3) Notation of the first identifier byte: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 Bits b 7 b 6 define the ASN.1 tag class: b 7 b 6 = 00 : UNIVERSAL b 7 b 6 = 01 : APPLICATION b 7 b 6 = 10 : context-specific b 7 b 6 = 11 : PRIVATE Bit b 5 defines the encoding form: b 5 = 0 : Primitive form (i.e. length is known) b 5 = 1 : Constructed form (length known or not) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding of the identifier (2/3) Bits b 4 b 3 b 2 b 1 b 0 define the value of the tag: b 4 b 3 b 2 b 1 b 0 < : Bit string represents the tag number in big-endian Tag numbers 0,..., 30 can be represented in this form b 4 b 3 b 2 b 1 b 0 = : Tag number is encoded in the following bytes Every relevant byte for the tag number starts with a '1' The last tag number byte starts with a '0' Ignore the most significant bit of these bytes to get the actual tag number Typically does not happen in our context Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

12 BER encoding of the identifier (3/3) Source: Olivier Dubuisson, ASN.1 Communication between Heterogeneous Networks Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER encoding of the length (1/2) Notation of the first length byte: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 Bit b 7 = 0: Short definite length Value requires b 6 b 5 b 4 b 3 b 2 b 1 b 0 bytes (written in binary) Maximum length of value: b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 = = 127 Bit b 7 = 1: Long definite length or indefinite length b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 = : Indefinite length Otherwise b 6 b 5 b 4 b 3 b 2 b 1 b 0 defines the following number of bytes to encode the length of value Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

13 BER encoding of the length (2/2) Source: Olivier Dubuisson, ASN.1 Communication between Heterogeneous Networks Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ BER vs. DER Drawback of BER BER does not require a specific encoding form, if multiple encodings are possible (e.g. for string types) Ambiguity of encoding is possible for the same input of raw data If a digital signature is computed over this raw data, the signature is not unique Solution: Use Distinguished Encoding Rules (DER) A subset of BER Deterministic enoding of raw data Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

14 Contents ASN.1 foundations ASN.1 encoding Demo Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo Hex dump of a certificate of the German Federal Network Agency Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

15 ASN.1-Demo: Identifier of first ASN.1 variable ASN.1 type of the first ASN.1 variable is encoded within the identifier Byte number 0: Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Bit string: ASN.1 type: Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Length of value of first ASN.1 variable The length of the first ASN.1 value is encoded after the identifier: Byte number : Corresponding bit string: The length is encoded in the following bytes!! Actual length of the value in bytes (octets) to : In hex: Decimal: Comparison to the length of the file: $ ls -l BNetA-10R-CA-s42.cer -rw baier baier Nov 13:25 BNetA-10R-CA-s42.cer Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

16 ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Byte = Length: Byte : Corresponding bit string: The length is encoded again in the following bytes!! Actual length of the value in bytes (octets) to : In hex: Decimal: Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte : Actual length of the value is bytes Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

17 ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte is Value is encoded in octet : Context-specific tag ends here Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/ ASN.1-Demo: Next ASN.1 variable Its header is encoded in the bytes to Type: Byte = Corresponding bit string: ASN.1 tag class (first two bits): Encoding form (third bit): Value of the tag: Length: Byte is Value is encoded in octet : INTEGER ends here Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

18 ASN.1-Demo: openssl asn1parse openssl asn1parse shows ASN.1 structure of certificate (take care of the input encoding form using the switch inform ) Harald Baier Security Protocols and Infrastructures h_da, Winter Term 2012/

Prepared By: P0209337 Lichen. P0209259 Xulu

Prepared By: P0209337 Lichen. P0209259 Xulu Local Certificate Authority Prepared By: P0209337 Lichen P0209259 Xulu 1 2 Abstract Today, security of information is most important in the Internet; for example, electronic commerce and electronic government

More information

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose

More information

Security Issues of the Digital Certificates within Public Key Infrastructures

Security Issues of the Digital Certificates within Public Key Infrastructures 16 Security Issues of the Digital Certificates within Public Key Infrastructures Cristian TOMA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.toma@ie.ase.ro The

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

Towards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland

Towards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland Towards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland Table of Contents Motivation ^2G and 3G Cellular Networks ^ IEEE 802.11

More information

Abstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One

Abstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One Kommunikationssysteme (KSy) - Block 7 Abstract Syntax Notation One ASN.1 Dr. Andreas Steffen 2000-2002 A. Steffen, 22.01.2002, KSy_ASN1.ppt 1 ASN.1 Abstract Syntax Notation One Standards and applications

More information

Package PKI. July 28, 2015

Package PKI. July 28, 2015 Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),

More information

Package PKI. February 20, 2013

Package PKI. February 20, 2013 Package PKI February 20, 2013 Version 0.1-1 Title Public Key Infrastucture for R based on the X.509 standard Author Maintainer Depends R (>=

More information

public key version 0.2

public key version 0.2 version 0.2 Typeset in L A TEX from SGML source using the DocBuilder-0.9.8.4 Document System. Contents 1 User s Guide 1 1.1 Introduction.......................................... 1 1.1.1 Purpose........................................

More information

SNMP....Simple Network Management Protocol...

SNMP....Simple Network Management Protocol... SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP

More information

Common Secure Interoperability Version 2 CSI v2

Common Secure Interoperability Version 2 CSI v2 Common Secure Interoperability Version 2 CSI v2 A User s View by Don Flinn The Specification Team Compaq Concept Five Gemstone Hewlett Packard IBM Inprise IONA/OOC Oracle Persistence Promia SUN Syracuse/Adiron

More information

Chapter 4: Computer Codes

Chapter 4: Computer Codes Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data

More information

MTAT.07.017 Applied Cryptography

MTAT.07.017 Applied Cryptography MTAT.07.017 Applied Cryptography Public Key Infrastructure (PKI) Public Key Certificates (X.509) University of Tartu Spring 2015 1 / 42 The hardest problem Key Management How to obtain the key of the other

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.691 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm. Lecture Notes on Computer and Network Security

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm. Lecture Notes on Computer and Network Security Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) February 26, 2015 2:48pm c 2015 Avinash

More information

Biometrics, Tokens, & Public Key Certificates

Biometrics, Tokens, & Public Key Certificates Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

Design and Implementation of LDAP Component Matching for Flexible and Secure Certificate Access in PKI

Design and Implementation of LDAP Component Matching for Flexible and Secure Certificate Access in PKI Design and Implementation of LDAP Matching for Flexible and Secure Certificate Access in PKI Sang Seok Lim IBM Watson Research Center P.O. Box 218 Yorktown Heights, NY 10598 slim@us.ibm.com Jong Hyuk Choi

More information

RaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL

RaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL RaneNote : SIMPLE? NETWORK MANAGEMENT PROTOCOL : Simple? Network Management Protocol Overview The Message Format The Actual Bytes Douglas Bruey Rane Corporation RaneNote 161 2005 Rane Corporation Introduction

More information

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS Alternate Representations of the Public Key Cryptography Standards (PKCS Using S-Expressions, S-PKCS Matthew D. Wood Carl M. Ellison Intel Security Technology Lab Alternate Representations of the Public

More information

Detailed Specifications

Detailed Specifications 1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for

More information

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David

More information

Pemrograman Dasar. Basic Elements Of Java

Pemrograman Dasar. Basic Elements Of Java Pemrograman Dasar Basic Elements Of Java Compiling and Running a Java Application 2 Portable Java Application 3 Java Platform Platform: hardware or software environment in which a program runs. Oracle

More information

Advanced Security Mechanisms for Machine Readable Travel Documents

Advanced Security Mechanisms for Machine Readable Travel Documents Technical Guideline TR-03110-3 Advanced Security Mechanisms for Machine Readable Travel Documents Part 3 Common Specifications Version 2.10 20. March 2012 History Version Date Comment 1.00 2006-02-08 Initial

More information

Common Security Protocol (CSP) ACP 120. June 1998

Common Security Protocol (CSP) ACP 120. June 1998 Common Security Protocol (CSP) ACP 120 June 1998 UNCLASSIFIED I ORIGINAL (Reverse Blank) Foreword 1. ACP120, COMMON SECURITY PROTOCOL, is an UNCLASSIFIED publication. Periodic accounting is not required.

More information

public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015

public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015 public_key Copyright 2008-2015 Ericsson AB, All Rights Reserved public_key 1.0.1 September 22, 2015 Copyright 2008-2015 Ericsson AB, All Rights Reserved Licensed under the Apache License, Version 2.0 (the

More information

A New On-line Certificate Validation Method using LDAP Component Matching Technology

A New On-line Certificate Validation Method using LDAP Component Matching Technology A New On-line Certificate Validation Method using LDAP Component Matching Technology Jong Hyuk Choi, Sang Seok Lim, and Kurt D. Zeilenga Abstract This paper presents a new on-line certificate validation

More information

COMMON PKI SPECIFICATIONS FOR INTEROPERABLE APPLICATIONS FROM T7 & TELETRUST SPECIFICATION INTRODUCTION

COMMON PKI SPECIFICATIONS FOR INTEROPERABLE APPLICATIONS FROM T7 & TELETRUST SPECIFICATION INTRODUCTION COMMON PKI SPECIFICATIONS FOR INTEROPERABLE APPLICATIONS FROM T7 & TELETRUST SPECIFICATION INTRODUCTION VERSION 2.0 20 JANUARY 2009 Common PKI: Introduction Version 2.0 Contact Information The up-to-date

More information

PL / SQL Basics. Chapter 3

PL / SQL Basics. Chapter 3 PL / SQL Basics Chapter 3 PL / SQL Basics PL / SQL block Lexical units Variable declarations PL / SQL types Expressions and operators PL / SQL control structures PL / SQL style guide 2 PL / SQL Block Basic

More information

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T) Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating

More information

The New IoT Standard: Any App for Any Device Using Any Data Format. Mike Weiner Product Manager, Omega DevCloud KORE Telematics

The New IoT Standard: Any App for Any Device Using Any Data Format. Mike Weiner Product Manager, Omega DevCloud KORE Telematics The New IoT Standard: Any App for Any Device Using Any Data Format Mike Weiner Product Manager, Omega DevCloud KORE Telematics About KORE The world s largest M2M/IoT services provider 12 Carriers Enterprise

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version

More information

Configuring SSL Termination

Configuring SSL Termination CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL

More information

SNMP SMI Structure of Management Information

SNMP SMI Structure of Management Information SNMP SMI Structure of Management Information Network Mgmt/Sec. 1 Outline ASN.1 short intro BER grammar/types SMI types and application types MACROs tables/examples 2 jrb comment: this will seem like much

More information

A PKI case study: Implementing the Server-based Certificate Validation Protocol

A PKI case study: Implementing the Server-based Certificate Validation Protocol 54 ISBN: 978-960-474-048-2 A PKI case study: Implementing the Server-based Certificate Validation Protocol MARIUS MARIAN University of Craiova Department of Automation ROMANIA marius.marian@cs.ucv.ro EUGEN

More information

The Answer to the 14 Most Frequently Asked Modbus Questions

The Answer to the 14 Most Frequently Asked Modbus Questions Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in

More information

mod_ssl Cryptographic Techniques

mod_ssl Cryptographic Techniques mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises

More information

System and Network Management

System and Network Management - System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!

More information

Technical description of X.509 and UN/EDIFACT certificates. Specific user requirements on certificate data elements mapping

Technical description of X.509 and UN/EDIFACT certificates. Specific user requirements on certificate data elements mapping Technical description of X.509 and UN/EDIFACT certificates. Specific user requirements on certificate data elements mapping Montserrat Rubia, UPC Juan Carlos Cruellas, UPC Manel Medina, UPC Isabel Gallego,

More information

Importing Lease Data into Forms Online

Importing Lease Data into Forms Online Blue Moon Software presents May 2012 Importing Lease Data into Forms Online A Developer's Guide Edited by Michael Phillipson wwwbluemooncom Table of Contents XML and the Blue Moon DTD 1 Login Data1 Login

More information

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust. Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery

More information

Memory is implemented as an array of electronic switches

Memory is implemented as an array of electronic switches Memory Structure Memory is implemented as an array of electronic switches Each switch can be in one of two states 0 or 1, on or off, true or false, purple or gold, sitting or standing BInary digits (bits)

More information

CSI 333 Lecture 1 Number Systems

CSI 333 Lecture 1 Number Systems CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...

More information

TechNote 0006: Digital Signatures in PDF/A-1

TechNote 0006: Digital Signatures in PDF/A-1 TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity

More information

Nuance Mobile Developer Program. HTTP Services for Nuance Mobile Developer Program Clients

Nuance Mobile Developer Program. HTTP Services for Nuance Mobile Developer Program Clients Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Notice Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Copyright 2011

More information

Internationalizing the Domain Name System. Šimon Hochla, Anisa Azis, Fara Nabilla

Internationalizing the Domain Name System. Šimon Hochla, Anisa Azis, Fara Nabilla Internationalizing the Domain Name System Šimon Hochla, Anisa Azis, Fara Nabilla Internationalize Internet Master in Innovation and Research in Informatics problematic of using non-ascii characters ease

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

Section 4: Interim Local Management Interface Specification

Section 4: Interim Local Management Interface Specification Section 4: Interim Local Management Interface Specification 105 ATM USER-NETWORK INTERFACE SPECIFICATION (V3.1) Scope Whereas the ITU-T and ANSI standards committees have been working to define both C-plane

More information

Variables, Constants, and Data Types

Variables, Constants, and Data Types Variables, Constants, and Data Types Primitive Data Types Variables, Initialization, and Assignment Constants Characters Strings Reading for this class: L&L, 2.1-2.3, App C 1 Primitive Data There are eight

More information

Information Systems Security Management

Information Systems Security Management Information Systems Security Management Gerald Quirchmayr, Edgar Weippl, Oliver Jorns Fakultät für Wirtschaftswissenschaften und Informatik Liebiggasse 4/3-4, 1010 Wien Tel. +43-1-4277-38431 Fax +43-1-4277-38449

More information

The programming language C. sws1 1

The programming language C. sws1 1 The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan

More information

Number of bits needed to address hosts 8

Number of bits needed to address hosts 8 Advanced Subnetting Example 1: Your ISP has assigned you a Class C network address of 198.47.212.0. You have 3 networks in your company with the largest containing 134 hosts. You need to figure out if

More information

Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

More information

Introduction to Python

Introduction to Python Caltech/LEAD Summer 2012 Computer Science Lecture 2: July 10, 2012 Introduction to Python The Python shell Outline Python as a calculator Arithmetic expressions Operator precedence Variables and assignment

More information

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Grid Computing - X.509

Grid Computing - X.509 Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic

More information

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act

Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act for Digital Signature Certificates issued under Information Technology Act Version 2.4 December 2009 Controller of Certifying Authorities Department of Information Technology Ministry of Communications

More information

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...

More information

Number Representation

Number Representation Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data

More information

Type 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31

Type 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 Type 2 Tag Operation Specification Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 RESTRICTIONS ON USE This specification is copyright 2005-2011 by the NFC Forum, and

More information

ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6)

ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6) ASSEMBLY LANGUAGE PROGRAMMING (6800) (R. Horvath, Introduction to Microprocessors, Chapter 6) 1 COMPUTER LANGUAGES In order for a computer to be able to execute a program, the program must first be present

More information

Character Code Structure and Extension Techniques

Character Code Structure and Extension Techniques Standard ECMA-35 6th Edition - December 1994 Standardizing Information and Communication Systems Character Code Structure and Extension Techniques Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - X.400:

More information

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science 1 Outline Background SNMP Basics SNMP Version 1 SNMP Version 2 SNMP Management,

More information

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view Version 0.5 Richard Levitte, mailto:levittelp.se November 18, 2003 A serie of lectures PKI and OpenSSL part 1: codex.509

More information

Packet Structure and Encoding

Packet Structure and Encoding Packet Structure and Encoding Network Layer details Application Layer details Abstract Syntax Notation One (ASN.1) Encoding Application Services and Properties Context Specific and Application Tags Primitive

More information

HL7 Conformance Statement

HL7 Conformance Statement HL7 Conformance Statement Release VA20B (2014-03-28) ITH icoserve technology for healthcare GmbH Innrain 98, 6020 Innsbruck, Austria +43 512 89059-0 www.ith-icoserve.com Any printout or copy of this document

More information

Visa/MasterCard Secure Electronic Transactions (SET) Scope of SET Protocols

Visa/MasterCard Secure Electronic Transactions (SET) Scope of SET Protocols Visa/MasterCard Secure Electronic Transactions (SET) Specification of the Official method of achieving network payment via Credit Cards Announced in February 1996 Supported by Visa, MasterCard, GTE, IBM,

More information

ETSI TS 102 280 V1.1.1 (2004-03)

ETSI TS 102 280 V1.1.1 (2004-03) TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,

More information

HP Service Virtualization

HP Service Virtualization HP Service Virtualization Fixed Length Protocol Virtualization SV Training September 2014 Fixed Length Protocol Virtualization Technology Description Use Cases Supported Message Structures SV Service Description

More information

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

More information

2011, The McGraw-Hill Companies, Inc. Chapter 3

2011, The McGraw-Hill Companies, Inc. Chapter 3 Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through

More information

Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner.

Handout 1. Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Handout 1 CS603 Object-Oriented Programming Fall 15 Page 1 of 11 Handout 1 Introduction to Java programming language. Java primitive types and operations. Reading keyboard Input using class Scanner. Java

More information

The Hexadecimal Number System and Memory Addressing

The Hexadecimal Number System and Memory Addressing APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to

More information

Public Key Infrastructures. Andreas Hülsing

Public Key Infrastructures. Andreas Hülsing Public Key Infrastructures Andreas Hülsing X.509 Revocation 17-11-2015 PAGE 1 Certificate revocation Abortive ending of the binding between subject and key (public key certificate) OR subject and attributes

More information

FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION

FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION THE UNIVERSITY OF TRINIDAD & TOBAGO FINAL ASSESSMENT/EXAMINATION JULY 2015 Course Code and Title: CNET 2001 Network Architecture Programme: B.A.Sc. ICT Computer Engineering Date: Tuesday July 28, 2015

More information

Configuration of the DHCP server

Configuration of the DHCP server 104 Page 91 of 294 Contents This section contains information on the following topics: Overview................................................ 91 i2004 Internet Telephone....................................

More information

Lecture 8. IP Fundamentals

Lecture 8. IP Fundamentals Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities

More information

8 Tutorial: Using ASN.1

8 Tutorial: Using ASN.1 8 Tutorial: Using ASN.1 Data Types This tutorial describes how to use ASN.1 types and values in the SDL suite. You will learn how to import and use ASN.1 modules in your SDL diagrams, how to generate code

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016 Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula

More information

Core Components Data Type Catalogue Version 3.1 17 October 2011

Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business

More information

NEW SOUTH WALES DEPARTMENT OF TRANSPORT. Transport Services Division. Driver Authority Information Service E-Mail Format Specification

NEW SOUTH WALES DEPARTMENT OF TRANSPORT. Transport Services Division. Driver Authority Information Service E-Mail Format Specification NEW SOUTH WALES DEPARTMENT OF TRANSPORT. Transport Services Division Driver Authority Information Service E-Mail Format Specification 20 May 1999 TABLE OF CONTENTS 1 Introduction... 3 2 Definitions...

More information

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program. Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to

More information

Useful Number Systems

Useful Number Systems Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2

More information

Japannext PTS ITCH Market Data Specification. Version 1.4 Updated 3 October 2014

Japannext PTS ITCH Market Data Specification. Version 1.4 Updated 3 October 2014 Japannext PTS ITCH Market Data Specification Version 1.4 Updated 3 October 2014 Table of Contents 1. Introduction... 3 2. Overview... 3 3. Data Types... 3 4. Outbound Sequenced Messages... 3 4.1 Seconds...

More information

2.1 The scope of Time Stamping Protocol (TSP)

2.1 The scope of Time Stamping Protocol (TSP) XML Security Time Stamping Protocol Axelle Apvrille Vincent Girier Storage Technology European Operations 1 Rd Point Général Eisenhower 31106 Toulouse, France Axelle Apvrille,Vincent Girier @storagetek.com

More information

Apache Cassandra Query Language (CQL)

Apache Cassandra Query Language (CQL) REFERENCE GUIDE - P.1 ALTER KEYSPACE ALTER TABLE ALTER TYPE ALTER USER ALTER ( KEYSPACE SCHEMA ) keyspace_name WITH REPLICATION = map ( WITH DURABLE_WRITES = ( true false )) AND ( DURABLE_WRITES = ( true

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

More information

DATEVe:secure MAIL V1.1. ISIS-MTT-Assessment Report

DATEVe:secure MAIL V1.1. ISIS-MTT-Assessment Report DATEVe:secure MAIL V1.1 DATEV eg ISIS-MTT-Assessment Report Version 1.1 Date 08. July 2004 Hans-Joachim Knobloch, Fritz Bauspiess Secorvo Security Consulting GmbH Albert-Nestler-Straße 9 D-76131 Karlsruhe

More information

Utility Software II lab 1 Jacek Wiślicki, jacenty@kis.p.lodz.pl original material by Hubert Kołodziejski

Utility Software II lab 1 Jacek Wiślicki, jacenty@kis.p.lodz.pl original material by Hubert Kołodziejski MS ACCESS - INTRODUCTION MS Access is an example of a relational database. It allows to build and maintain small and medium-sized databases and to supply them with a graphical user interface. The aim of

More information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus

More information

Displaying SSL Certificate and Key Pair Information

Displaying SSL Certificate and Key Pair Information CHAPTER 6 Displaying SSL Certificate and Key Pair Information This chapter describes the show commands available for displaying SSL-related information, such as certificate signing request (CSR) parameter

More information

Today s topics. Digital Computers. More on binary. Binary Digits (Bits)

Today s topics. Digital Computers. More on binary. Binary Digits (Bits) Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro

More information

Moving from CS 61A Scheme to CS 61B Java

Moving from CS 61A Scheme to CS 61B Java Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you

More information

Japanese Character Printers EPL2 Programming Manual Addendum

Japanese Character Printers EPL2 Programming Manual Addendum Japanese Character Printers EPL2 Programming Manual Addendum This addendum contains information unique to Zebra Technologies Japanese character bar code printers. The Japanese configuration printers support

More information

CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It

CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It CHAPTER 5 5.1. Introduction Obfuscation is a process of converting original data into unintelligible data. It is similar to encryption but it uses mathematical calculations or programming logics. Encryption

More information

Signalling Control System Serial Train Information Interface

Signalling Control System Serial Train Information Interface Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for

More information

Email, SNMP, Securing the Web: SSL

Email, SNMP, Securing the Web: SSL Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan

More information

An XML Alternative for Performance and Security: ASN.1

An XML Alternative for Performance and Security: ASN.1 Web Services An XML Alternative for Performance and Security: ASN.1 Darren Mundy and David W. Chadwick Performance tests of XML and ASN.1 found that signed complex XML messages can be up to 1,000-percent

More information

Chapter 9 Network Management

Chapter 9 Network Management Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information