24 th IEEE Annual Computer Communications Workshop (CCW)
|
|
- Donna Grant
- 8 years ago
- Views:
Transcription
1 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California State University Northridge
2 24 th IEEE Annual Computer Abstract Threats and attacks to information systems security on digital network environment are growing rapidly, putting pressure on businesses to protect their tangible and intangible assets. It is reported that 75% of surveyed organizations have confronted different network security attacks. For that reason, cryptography is a vital of today s computer and communications networks, protecting everything from business to bank transactions and internet shopping.
3 24 th IEEE Annual Computer Abstract But the scholars argue that, the current encryption algorithms based on mathematical model introduce potential security holes related to the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. These cryptographic techniques are widely used but are not proved to be completely secure, representing one of the main threats to modern network communication systems. For past decade efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics.
4 24 th IEEE Annual Computer Topics 1. Understand the goals of network security 2. Determine the factors involved in a secure network strategy 3. Understand the basics of algorithms and how they are used in modern cryptography 4. Identify the differences between asymmetric and symmetric algorithms 5. Vulnerabilities/Weakness to the modern/classical cryptography 6. Understanding of the quantum cryptography 7. QKD protocol 8. Implementation of quantum cryptography 9. Vendors/Products/Research group 10. Summary /Q & A
5 24 th IEEE Annual Computer Understand the goals of network security Network security It is a process by which digital information assets are protected Goals Maintain integrity (data( is not altered or destroyed ) Protect confidentiality (Protection( of data from unauthorized ) Assure availability (Continuous( operation of network)
6 24 th IEEE Annual Computer Determine the factors involved in a secure network strategy Analysis both internal and external threats Define & enforce policies and procedures Reduce risk across perimeter security, the Internet, intranets, Extranet, and LANs Human factors Risk Assessment (Know your weakness) Limit access Achieve security through continuous process Remember physical security
7 24 th IEEE Annual Computer Determine the factors involved in a secure network strategy Firewalls Access Control (Only legitimate traffic) Management process to security issues Cryptography (Encryption/Decryption) IDS (Intrusion Detection Systems)
8 24 th IEEE Annual Computer Moore s Law and Quantum Physics
9 24 th IEEE Annual Computer Moore s Law and Quantum Physics The semiconductor industry realized that the improvement of computers according to Moor s law would all too soon reach the quantum limit, requiring radical changes in technology
10 24 th IEEE Annual Computer Understand the basics of algorithms and how they are used in modern cryptography Mathematical functions that work in tandem with a key Same plaintext data encrypts into different cipher-text with different keys Security of data relies on two factors: Strength of the algorithm Secrecy of the key
11 24 th IEEE Annual Computer Symmetric Algorithm Usually use same key for encryption and decryption Encryption key can be calculated from decryption key and vice versa Require sender and receiver to agree on a key before they communicate securely Security lies with the key Also called secret key algorithms, singlekey algorithms, or one-key algorithms Example: DES (1977), Triple DES (1998), AES
12 24 th IEEE Annual Computer Symmetric Algorithm
13 24 th IEEE Annual Computer Asymmetric Algorithm Use different keys for encryption and decryption Decryption key cannot be calculated from the encryption key Anyone can use the key to encrypt data and send it to the host; only the host can decrypt the data Also known as public key algorithms Example: Diffie-Hellman (1976) RSA (1977)
14 24 th IEEE Annual Computer Asymmetric Algorithm
15 Identify the differences between symmetric and asymmetric algorithm Type of algorithm Advantage Disadvantages Symmetric Single key Requires sender and receiver to agree on a key before transmission of data Security lies only with the key High cost Asymmetric Encryption and decryption keys are different Decryption key cannot be calculated from encryption key Security of keys can be compromised when malicious users post phony keys
16 Vulnerabilities/Weakness to the modern/classical cryptography Current encryption algorithms based on mathematical model introduce potential security holes related to the key refresh rate and key expansion ratio. There are three main problems with encryption schemes. The first is key distribution, which must be in itself, the second is key management, where the number of keys required in a system with a large number of principals does not scale well. Thirdly as computing power increases, and new classical computational techniques are developed, the length of time that a message can be considered secure will decrease, and numerical keys will no longer be able to provide acceptable levels of secure communications
17 Vulnerabilities/Weakness to the modern/classical cryptography Vulnerable to the progress in computation (supercomputers) and algorithms. Vulnerable to future quantum computation protocols. For example: Shor s Algorithm (Peter Shor): Factoring Allows for factoring large numbers on a quantum computer in polynomial time, theoretically breaking RSA encryption. While any practical application on Shor s algorithm may be decade away, but an experimental proof-of-concept of Shor s algorithm has successfully been achieved.
18 Understanding of the quantum cryptography For past decade efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics. Quantum cryptography concept developed by Charles H. Bennett and Gilles Brassard in 1984 (BB84) as part of research study between physics and information at IBM lab. The quantum system is based on the distribution of single particles or photons, and the value of a classical bit encodes by the polarization of a photon.
19 Photons A photon is an elementary particle of light, carrying a fixed amount of energy. Based on physical law, light may be polarized; polarization is a physical property that emerges when light is regarded as an electromagnetic wave. The direction of a photon s polarization can be fixed to any desired angle (using a polarizing filter) and can be measured using a calcite crystal.
20 Understanding of the Quantum cryptography In fact, the quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. This means, the polarization of a photon or light particle can only be known at the point when it is measured. Secondly, the photon polarization principle explains how light photons can be polarized in a specific direction. In addition, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982.
21 Photons Polarization A photon has a property called polarization, which is the plane in which the electric field oscillates. We can use photons of different polarizations to represent quantum states. Each of these photons is in a state denoted by one of the four following symbols:,, /, \ The first two photon states are emitted by a polarizer which is set with a rectilinear orientation and the other two states are emitted by a polarizer which is set with a diagonal orientation. In order to communicate, a coding system is necessary. State codes 1, while codes 0, and State / codes 0, while \ codes 1. +(0)=, +(1)=, x(0)= /, x(1)= \
22 Photons Polarization For example: If Alice wants to transmit the conventional bit 0 or 1, she may choose to use + and consequently send out over the quantum channel,, or choose to use x and consequently send out /, \ If Alice is sending only and to Bob, the coding system shall identify that Alice is using the base +. For example, if Alice sends sequence of photons:,,, ; the binary number represented with these states is Now, if Bob wants to obtain a binary number sent by Alice, he needs to receive each photon in the same basis. In this case, this is + basis
23 Photons Polarization A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell can be used too. The polarization basis is the mapping we decide to use for a particular state. Rectilinear: Diagonal: 0 state 0 45 state 0 90 state state 1
24 Photons Polarization Ultra-Miniature Pockels Cells Double Pockels Cells Single and Dual Crystal Pockels Cells
25 Measuring Photons A calcite crystal can be used to recover the bits encoded into a stream of photons. CaCO3 DIAGONA L axis
26 QKD Protocols A protocol is a set of rules governing the exchange of messages over a channel. A security protocol is a special protocol designed to ensure security properties are met during communications. There are three main security protocols for QKD: BB84, B92, and Entanglement-Based QKD. We will only discuss BB84 in this session.
27 BB4 Protocol BB84 was the first security protocol implementing Quantum Key Distribution. It uses the idea of photon polarization. The key consists of bits that will be transmitted as photons. Each bit is encoded with a random polarization basis!
28 BB4 Protocol
29 BB4 Protocol with No Eve (No eavesdropping) Alice is going to send Bob a random key. She begins with transmitting a random sequence of bits. Bits are encoded with a random basis, and then sent to Bob: Bit Basis + + Photon
30 BB4 Protocol with No Eve (No eavesdropping) Bob receives the photons and must decode them using a random basis. Some of his measurements are correct. Photon Basis? Bit?
31 BB4 Protocol with No Eve (No eavesdropping) Alice and Bob talk on the telephone: Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob. Bob tells Alice which basis he used to decode the same bits. Where the same basis was used, Alice and Bob agree on the bits.
32 Alice s Bit Alice s Basis + + Bob s Basis Bob s Bit Photon Test bits discarded Final Key = 01
33 BB4 Protocol with Eve (In the presence of eavesdropping) If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob s measurements. In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement(error Rate). Eve s measurements are bound to affect the states of the photons.
34 BB4 Protocol with Eve (In the presence of eavesdropping) As Eve intercepts Alice s photons, she has to measure them with a random basis and send new photons to Bob. The photon states cannot be cloned (no-cloning theorem which was first presented by Wootters and Zurek in Eve s presence is always detected: measuring a quantum system irreparably alters its state (The Heisenberg Uncertainty principle).
35 QKD Protocol Implementation (Key DistillationDistillation-Realistic Case)
36 QKD Protocol Implementation (Key DistillationDistillation-Realistic Case) Sifting is the process whereby Alice and Bob window away all the obvious failed qubits from a series of pulses. Sifting allows Alice and Bob reconcile their raw secret bit streams to remove the errors. Error detection and correction allows Alice and Bob to determine all the error bits among their shared, sifted bits, and correct them so that Alice and bob share the same sequence of error-corrected bits. The process of error detection allows Alice and Bob to estimate the current Quantum Bit Error Rate (QBER) on the quantum channel between them, which can then be used as input for privacy amplification.
37 QKD Protocol Implementation (Key DistillationDistillation-Realistic Case) Privacy Amplification is the process whereby Alice and bob reduce Eve s knowledge of their shared bits to an acceptable level. Authentication allows Alice and Bob to guard against man in the middle attack, i.e. allows Alice to ensure that she is communicating with Bob (and not Eve) and vice versa.
38 Implementing Quantum Cryptography (Real Cases) DARPA, The Bank Austria Creditanstalt, Creditanstalt, & Japan BBN, Harvard, and Boston University built the DARPA quantum network, the world s first network that delivers end-to-end network security via high-speed quantum key distribution, and tested that network against sophisticated eavesdropping attacks. This network allows users at BBN Technologies, Harvard University, and Boston University to tap into a fiber-optic loop secured by a quantum cryptography system.
39 Implementing Quantum Cryptography (Real Cases) DARPA, The Bank Austria Creditanstalt, Creditanstalt, & Japan For the Bank of Austria, the novel technology was demonstrated by the group of Professor Anton Zeilinger, Vienna University in collaboration with the group Quantum Technologies of Seibersdorf research. The bank transfer was initiated by Vienna s Mayor Dr. Michael Haupl, and executed by the director of the Bank Austria Creditanstalt, Dr. Erich Hampel. The information was sent via a glass fiber cable from the Vienna City Hall to the Bank Austria Creditanstalt branch office Schottengasse.
40 Implementing Quantum Cryptography (Real Cases) DARPA, the Bank Austria Creditanstalt, Creditanstalt, & Japan Mitsubishi Electric Corporation, NEC Corporation, and Institute of Industrial Science, University of Tokyo have successfully interconnected quantum cryptography systems developed by Mitsubishi Electric and NEC, the first time such an experiment has been successful in Japan.
41 Vendors, Products, & Research Group MagiQ Technologies, Inc. (USA) IdQuantique (Switzerland) NEC (Japan) Research Groups working on QKD at IBM and Toshiba (USA, Europe) Japan Research Group 01.html NIST Research Group
42 Vendors & Products QPN 7505 Up to 100 km
43 Vendors & Products
44 TECHNICAL CHALLENGES OF QKD AND FUTURE DIRECTION One of the challenges for the researchers, is distance limitation. Currently, quantum key distribution distances are limited to tens of kilometers because of optical amplification destroys the qubit state. Also to develop optical device capable of generating, detecting and guiding single photons; devices that are affordable within a commercial environment. Another issue is the lack of a security certification process or standard for the equipment. Also users need reassurance not only that QKD is theoretically sound, but also that it has been securely implemented by the vendors.
45 Summary Realization of practical quantum information technologies can not be accomplished without involvement of the network research community. The advances in computer processing power and the threat of limitation for today s cryptography systems will remain a driving force in the continued research and development of quantum cryptography. The technology has the potential to make a valuable contribution to the network security among government, businesses, and academic environment.
46 Thank You Q&A
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
More informationNetwork Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,
More informationThe New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
More information1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
More informationA Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: aparakh@unomaha.edu August 9, 01
More informationKy Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
More informationQUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationQuantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio
Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Review Key Citations Web Sites Glossary Conferences Editor Review Article 1. Cryptography - an Overview I
More informationSecurity in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com
More informationYALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
More informationAuthentication in Online Banking Systems through Quantum Cryptography
Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 anand_glee@yahoo.co.in, 2 lenka.sarojkumar@gmail.com
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationApplication of Quantum Cryptography to an Eavesdropping Detectable Data Transmission
Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science
More informationQuantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
More informationELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationCompter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
More information159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationQuantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Key Distillation Process on Quantum Cryptography Protocols in
More informationQuantum Cryptography: The Ultimate Solution to Secure Data Transmission?
Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,
More informationQuantum cryptography
Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2
More informationHigh speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
More informationFirst Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
More informationQuantum Encoder and Decoder for Secret Key Distribution with Check Bits
Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
More informationSFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationThree attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer
More informationRoyal Holloway Series 2011
Quantum key distribution: Awesome or pointless? Some believe the advent of quantum computing will reduce the time taken to solve cryptographic algorithms so dramatically that they will no longer provide
More informationQuantum Computing and Cryptography Their impact on cryptographic practice
Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
More informationSECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationInformation Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
More informationQUANTUM LIGHT :! A BRIEF INTRODUCTION!
Quantum Physics QUANTUM LIGHT : A BRIEF INTRODUCTION Philippe Grangier Laboratoire Charles Fabry de l'institut d'optique, UMR 85 du CNRS, 927 Palaiseau, France Quantum Physics * Alain Aspect, in «Demain
More informationSecuring Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationAuthentic Digital Signature Based on Quantum Correlation
Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital
More informationModule 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
More informationPractical security of quantum cryptography
Lars Vincent van de Wiel Lydersen Practical security of quantum cryptography Thesis for the degree of Philosophiae Doctor Trondheim, September 2011 Norwegian University of Science and Technology Faculty
More informationShor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationTELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
More informationA High Speed Quantum Communication Testbed
A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More informationQuantum Safe Cryptography V1.0.0 (2014-10)
White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily
More information802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
More informationQuantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com
Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationCommon Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
More informationIs your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
More informationSoran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
More informationAPWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
More informationNetwork Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More informationCSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
More informationVICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
More informationCryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
More informationSecurity. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
More informationNetwork Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
More informationAn Overview on Quantum Computing as a Service (QCaaS): Probability or Possibility
I.J. Mathematical Sciences and Computing, 2016, 1, 16-22 Published Online January 2016 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijmsc.2016.01.02 Available online at http://www.mecs-press.net/ijmsc
More informationChapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
More informationGuide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
More informationAs enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationQuantum Key Distribution Protocols: A Review
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XI (Mar-Apr. 2014), PP 01-09 Quantum Key Distribution Protocols: A Review Hitesh Singh 1, D.L.
More informationEncryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationYour 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
More informationNetwork Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
More informationKey Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Slide 09-1 Overview Key exchange Session vs. interchange
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationWEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT Namzak Labs White Paper, 2002-02 Version 1 September 30, 2002 Overview As deployment of computer applications over the Internet becomes more prevalent, companies
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationBasic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
More informationIntroduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
More informationCounter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
More informationChapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationThe Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationCryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
More informationNetwork Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
More informationEnhancing privacy with quantum networks
Enhancing privacy with quantum networks P. Mateus N. Paunković J. Rodrigues A. Souto SQIG- Instituto de Telecomunicações and DM - Instituto Superior Técnico - Universidade de Lisboa Abstract Using quantum
More informationNext Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.
Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1
More informationSSL A discussion of the Secure Socket Layer
www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
More informationQuantum Safe Cryptography and Security
ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)
More information