Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
|
|
|
- Alexandrina Walton
- 10 years ago
- Views:
Transcription
1 Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based on integer factorization. To counter this threat, researchers have already designed and tested alternative protocols that do not rely on factorization. Quantum key distribution, a cryptographic mechanism that relies on the inherent randomness of quantum mechanics, serves not only as an option to replace techniques made vulnerable by quantum computing, but also as a more secure protocol that works fundamentally differently from previous cryptographic techniques. However, it is still subject to clever forms of eavesdropping and poses a significant challenge to implementation. 1. Motivation Secure communication and authentication in the modern ages stems mostly from the idea of public-key cryptography proposed by Diffie and Hellman(1976). This technique and its successors provide security by allowing two parties to establish secure communications solely through the exchange of publicly available keys, without revealing the privately held keys needed to decrypt the messages. It is mathematically possible to calculate the private key by using the publicly available information, thus breaking the security of the technique, but this proves to be intractable given the power of modern computers. For a sufficiently long key, solving the factorization problem to crack the private key would take longer than the age of the universe. Because of this assurance, public-key cryptography forms the backbone of a variety of authentication protocols such as SSL. Even applications that rely on more powerful symmetric key encryption rely on public-key cryptography to perform the series of handshakes needed to securely pass the secret key used in the encryption process. As a result, the Diffie-Hellman technique is present in almost all modern cryptographic exchanges. However, the intractability that has made publickey cryptography so useful does not apply to the steadily growing field of quantum computing. Quantum computers use the energy states of atoms rather than electric switches to represent information. In a traditional computer, a single bit can be set to either 0 or 1 through the application or removal of current. Thus a computer consisting of n bits may store any one of 2 n values. Due to quantum uncertainty, though, a quantum bit (qubit) may exist in a coherent superposition of the states 0 and 1, meaning it holds both values at the same time. A quantum computer containing n qubits can store all 2 n possible values at the same time, and on any given computational cycle can perform an operation on all numbers simultaneously. As a result, quantum computers may be programmed in a manner fundamentally different from classic computers. There exist quantum algorithms that have no known analogues on current computers. One such algorithm, developed by Shor in 1994, is a polynomial time solution to the integer factorization problem (Shor, 1995). The algorithm takes advantage of the simultaneity of quantum states to rapidly solve a periodic function that is the most time-consuming step in more traditional factorization algorithms. Like most quantum algorithms, Shor s method contains an element of randomness and does not guarantee a correct answer on any given iteration. However, even traditional computers can quickly check whether or not a proposed factor of an integer is correct, so Shor s algorithm may be rapidly run as many times as needed to produce the correct answer. The quantum factorization algorithm has already been tested on a rudimentary quantum computer and found to be correct. While the sample problem used, factoring the number 15, was trivial, the proof of concept demonstrates that public-key cryptography faces a looming danger from quantum computing. As more advanced quantum computers are developed, it will become trivial to crack the current key sizes used in RSA. Because Shor s algorithm is polynomial, increasing the key size will not prove to be an effective deterrent to cracking attempts. In order to protect information in the quantum computing age, entirely new cryptographic techniques will be required. 2. Quantum Key Distribution An encryption method with the potential of not only circumventing the shortcomings of public-key cryptography but also of revolutionizing the way secure messages are exchanged has been under development for the last 20 years. This technique is known as quantum key distribution(qkd), and relies on the laws of quantum mechanics to provide a new method of exchanging a secret encryption key. Under traditional cryptography, there is no way for two individuals to securely share a secret key over an unprotected channel because of the possibility of an eavesdropper. This is why public-key cryptography is often used to authenticate a communication channel before a secret key is exchanged. In contrast, QKD provides a mechanism by which two parties may create a secret key in
2 the presence of an eavesdropper without having their security compromised. QKD can be implemented in a variety of manners depending on the medium of transmission and the errorcorrecting schemes in place, so it may be more illustrative to first discuss the differences between QKD and current cryptographic techniques. At the heart of QKD is the encoding of the information to be transferred as a quantum state, whether that be a polarized photon or a pair of particles experiencing quantum entanglement. Throughout the history of cryptography, all ciphers have had one thing in common: the set of symbols used to represent information carried the same meaning to an eavesdropper as it did to the intended recipient. Whether the message being transmitted consisted of letters, pictures, or differences in electric potential indicating binary digits, an eavesdropper had the ability to copy the information before allowing it to reach the true recipient. This man in the middle attack has been an ever-present threat that cryptologists have had to take into account when designing protocols. Quantum particles, however, operate in fundamentally different manner than traditional means of conveying information. Namely, due to quantum uncertainty it is literally impossible to recreate an arbitrary quantum state. This means that when a bit of information is encoded as a particle and sent down a quantum communication line, and eavesdropper who intercepts the particle is no longer guaranteed the ability to copy it and send it on to the intended recipient. Thus, quantum encoding offers the ability to design protocols that talk over the head of a man in the middle for the first time in history. It must be emphasized that this means that not only does QKD offer immunity to the integer factorization attacks that threaten modern cryptography, when properly implemented it offers a fundamentally more secure means of communication. As long as the laws of quantum physics are found to be valid, QKD offers a guarantee against complete eavesdropping that is not found in any other means of information transmission. This is not to say that quantum communication is a magic bullet that solves the problem of secure communication. In order for a protocol to allow two individuals to communicate effectively via a quantum channel, some restrictions must be placed on the allowed states of the particle being used to transmit the message. If this were not the case, the same inscrutability that denies eavesdroppers the opportunity to attack would prevent the intended recipient from extracting any information from the message. By restricting the states, however, it becomes possible for a lucky attacker to gain some information by applying knowledge of the allowed states to the tapped communication line. Thus, a complete QKD protocol consists of several components: a scheme for encoding binary data in quantum states, a mechanism that uses these quantum states to allow two users to agree on a shared random key, error-correction processes to reduce the effects of noise in the communication line, and a privacyenhancing process to reduce the information acquired by a clever eavesdropper to an unusable level. Once these steps are complete the users should have available a shared, randomly-generated, secret key of which an intruder knows nothing or close to nothing. This key can then be used in a symmetric key cryptographic algorithm or as a one-time pad to allow the two users to communicate securely over traditional channel. Quantum key distribution is thus a mechanism for delivering via quantum channels a cryptographic key for use in existing communication systems. 3. The BB84 Protocol The discussion to this point has been kept vague due to the great variety available when designing a QKD system. Many papers have been published since the invention of QKD on the different schemes available for encoding numbers as quantum states, which in turn affects the mechanism for generating a random key. However, a concrete example would help illustrate more clearly the concepts that have so far been discussed only abstractly. The first QKD protocol ever designed was presented by Bennet and Brassard in Their system, known as the BB84 protocol, used polarized photons as the means for transmitting information (Bennet & Brassard, 1985). When a photon is polarized, it oscillates along a single axis as it propagates through space. An immediate application of this idea is to agree upon an orientation to represent the number one, and transmit photons corresponding to the number one polarized so that they oscillate in that orientation. A detector can be configured to verify whether or not the incoming photon is in that orientation. If it is, the receiver knows that a 1 has been transmitted, and if not then a 0. It is important to note that the detector can only register whether or not the photon was in a given orientation. The act of observing it destroys the orientation, so if the photon was not oscillating along the axis agreed upon to represent 1, it is impossible to determine which axis it was in fact oscillating along. If the system relied only upon this single axis representing 1 the protocol would still be vulnerable to an eavesdropper who knew what this orientation was and tapped into the communication line with a receiver of their own. Therefore the BB84 protocol calls for four states, two representing 1, and two representing 0. These four states provide two bases for transmitting the information. This means that for a receiver to properly decode the qubit it must not only have access to the photon but also know which basis was being used to transmit it. With this modification an eavesdropper in the middle is faced with a conundrum. In order to properly intercept messages they must choose one of the two bases with which to interpret incoming photons. Without any outside knowledge they will have to guess, meaning they will on average choose the
3 incorrect basis for half the photons. These photons will provide no usable information, and thus the attacker is limited to accessing at most half the material being transmitted. Of course, the true recipient of the message faces the same problem. The BB84 protocol thus specifies a mechanism for the two users to extract meaningful information despite this handicap. The session begins when the users(known as Alice and Bob, of course) generate some random numbers. Alice needs two numbers, one to encode as photons and transmit to Bob, and another to determine which basis to use for each qubit she sends. It is important that the bases be selected randomly so that Eve, the malicious attacker, cannot gain more than 50% of the message. Bob s random number, on the other hand, is used to decide which basis he will use when receiving Alice s qubits. Alice begins transmitting her random number to Bob one qubit at a time using a randomly selected basis each time. Bob meanwhile receives each qubit according to his randomly selected basis. Because half of Alice s qubits, on average, were encoded using a different basis, Bob has had to guess on what value half of them held. Since he will be right about half the time when guessing, he now has a copy of the random number Alice sent him in which about 25% of the bits are incorrect. However, Alice and Bob can now announce on a public channel which bases they used for each qubit and throw away each qubit they differed on. Ignoring for the moment errors introduced by the photon transmission process, Alice and Bob now possess a shared number derived from the random numbers each of them originally generated. This whole scenario took place without the interference of Eve, however. Imagine now that Eve had gained access to the quantum channel and had been making her own guesses as to the basis being used by Alice. At the end of the transmission when Bob and Alice announce which bases they were using, Eve now knows which of her qubits are useless and can discard them too. However, because she used a different set of bases than the ones randomly selected by Bob her set of mismatched bases is completely different from his. As a result, when she throws away the qubits Alice and Bob are discarding, she is still missing about half the qubits that were transferred, meaning she cannot gain access to the secret key. It could be rightfully declared that having an eavesdropper possess even half the key is an undesirable scenario. Fortunately, the scenario described above in which Eve plays along with Alice and Bob as they go through the key creation process is impossible. This is because, as observed earlier, quantum information is irrevocably altered upon viewing. In order to eavesdrop without being detected, Eve must send each piece of information she intercepts off to Bob in order to conceal her interference. However, because her bases differ from Alice s Eve has lost about half the information she intercepted. This means she can only guess at what the qubits contained when she sends her false copies on to Bob. When Alice and Bob compare results after creating their key, they will find that there is still a 25% error rate in the data because of the corruption caused by Eve s interference. This error rate is easily detectable, and will reveal to Alice and Bob that there is an intruder in their communication line. This summary of the BB84 protocol highlights the differences between QKD techniques and traditional quantum computing practices. However, it also made several idealizations along the way. For one, error due to degradation of the quantum signal was discounted, which is a quite unrealistic assumption to make given the complexity of current quantum transmission devices. Secondly, the intruder detection based on error rate only holds true if the eavesdropper attempts to intercept every photon. A clever intruder who is aware of this limitation might try to intercept only a fraction of the incoming qubits, thus driving the error rate down to a level that may be attributed to signal degradation rather than malicious intrusion. In order to complete this, or any other QKD protocol, measures must be taken to correct for these possibilities. Fortunately the tasks of removing the flaws introduced by signal error and reducing the information held by an intruder are challenges faced by conventional cryptographic algorithms, and thus techniques currently exist for fighting both problems. The methods available for error correction are varied, and the particular one used does not matter as long as it minimizes the private information shared by Alice and Bob during the correction process. It is important to ensure that Eve does not gain access to any additional material beyond that acquired during her initial snooping. Once the errors have been removed and Alice and Bob share a secret key, they can begin using techniques to minimize the information held by Eve. In general, these methods rely on recombining the bits of the secret key in some fashion such that Eve, who is missing many of the bits, will find impossible to follow. One simple example mentioned by Gisin et al. in their discussion on the subject is the technique of randomly selecting segments of the key, xoring them, and replacing the segments with the result (Gisin et al., 2002). Eve may know which segments are being selected if Alice and Bob agree on them over a public channel, but because she lacks all the bits she will lose information each time an xor is carried out on incomplete segments of her key. 4. Obstacles and Vulnerabilities As revolutionary and intriguing as QKD is, it is far from a perfect solution to the problem of secure communications. There are several obstacles to the creation of a system capable of running QKD protocols, and while quantum mechanics offers security unavailable to
4 other cryptographic methods there are still vulnerabilities that must be guard against. The primary barrier to implementing QKD systems is the difficulty in creating and maintaining particles that exhibit desired quantum states without experiencing contamination from the environment. The polarized photons described in the BB84 protocol, for example, must be produced by a laser operating in a narrow range of frequencies. It is important that only one photon be dispatched at a time, and while there is no laser in existence that can guarantee that, minimizing the occurrence of double photons requires careful configuration. The receiving apparatus must also be carefully prepared, and false positives, signals received in the absence of a dispatched photon, are an unfortunate feature of non-idealized receivers. The method of transporting the signal to the receiver poses another problem. While experiments in the laboratory have implemented QKD by launching photons through open space, this method is impractical over all but the shortest distances due to interference. Conventional fiber optic cables of the sort currently in use by telecommunications companies do not entirely solve the problem, however. The longer the length of cable, the greater the chance of the photon gradually shifting polarity as it travels down the length due to imperfections. While QKD has been run over fiber optic cables more than 20 kilometers long, it was observed that the error rate began increasing the longer the protocol was run as the cable slowly shifted out of alignment with the receiver. These various challenges in design pose a significant obstacle to the general production and use of QKD systems. Because quantum encryption requires hardware not currently in use in most facilities and great expertise to tune the proper equipment once it is acquired, the technique is not currently useful outside the laboratories of the scientists who research it. Until more sophisticated and generally usable equipment is available, QKD is simply an impractical alternative for most users. In addition to the physical challenges that impede the propagation of QKD systems, there are security considerations that need to be taken into account when considering a shift to quantum cryptography. A QKD protocol is only as strong as its weakest point. In the case of the BB84 protocol, Alice and Bob communicate a large amount of information to each other in the course of finalizing their key selection. While it is not important to the security of QKD that the channel they use for communication be private, it is critical that it be authenticated. If Eve has the ability to impersonate Bob or Alice, then she can simply share her information in place of the intended recipient and thus have her unknowing partner aid her in establishing the secure key. The most popular method of authenticating communication is public-key cryptography, which poses a chicken-or-the-egg dilemma to quantum cryptography as an heir to asymmetric key algorithms. Assuming a secure method of authentication has been provided, however, there is still cause for caution when implementing a QKD system. A clever eavesdropper can calculate via probability and information theory the optimum strategy for intercepting qubits to maximize their information gain while minimizing their error rate. While it is still guaranteed that they can never acquire the whole key just by eavesdropping, the more key information obtained by the intruder the greater the chance of them cracking the resulting encryption. It is therefore still vital that users of the QKD protocol take steps to protect themselves from well-prepared intruders using optimized strategies. Finally, a well equipped intruder can exploit the physical vulnerabilities of the system mentioned earlier to acquire more information than they could in the idealized model. For example, whenever a laser emitting photons as part of the BB84 protocol accidentally releases two photons simultaneously, an eavesdropper has the opportunity to capture and analyze one while allowing the other to reach its destination. Thus the intruder gains information without a corresponding increase in the error rate, decreasing the chance that they will be detected. Because the field of quantum cryptography is still young, knowledge of potential attacks and their success rates is relatively undeveloped. As such, it is important that anyone implementing the QKD protocol not mistake the security offered by quantum mechanics as a guarantee of perfect security. As with any cryptographic protocol, good planning and cautious monitoring of a QKD implementation will go a long way towards protecting against attacks as they are developed. 5. Conclusion Quantum key distribution offers greater potential for secure communications than any previous cryptographic protocol. The fact that is immune not just to the new types of attacks made possible to quantum computing, but is in fact unable to be totally compromised by any physical means makes it a very impressive application of quantum mechanics. However, due to the shortcomings of the technology currently available to implement quantum cryptography systems, it will be some time before the technique can be widely adopted. As quantum computing develops towards the point at which modern day encryption techniques are called into question, the same technological advances that threaten secure communication should bring forth a new cryptography paradigm that will carry computers through the quantum age.
5 References Bennett, C. H. & Brassard, G. (1985). Quantum public key distribution system. IBM Tech. Discl. Bull, 28, Gisin, N., et al. (2002). Quantum cryptography. Reviews of Modern Physics, 74, Hughes, R., et al. (1995). Quantum cryptography. Contemporary Physics, 36, 149. Shor, P.W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings of Foundations of Computer Science 94.
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Quantum Computing and Cryptography Their impact on cryptographic practice
Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is
Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio
Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Review Key Citations Web Sites Glossary Conferences Editor Review Article 1. Cryptography - an Overview I
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?
Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Shor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
The science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Quantum Safe Cryptography V1.0.0 (2014-10)
White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Authentication in Online Banking Systems through Quantum Cryptography
Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 [email protected], 2 [email protected]
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Quantum Encoder and Decoder for Secret Key Distribution with Check Bits
Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May
Elliptic Curve Cryptography
Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Quantum cryptography
Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Securing Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Final Project RSA Secure Chat Server CSC 290 Warren Fong [email protected]
Final Project RSA Secure Chat Server CSC 290 Warren Fong [email protected] Abstract Chat servers today are readily available and very useful in conversing with people that might be close by or
A High Speed Quantum Communication Testbed
A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Quantum Safe Cryptography and Security
ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)
