Crypton: Zero-Knowledge Application Framework
|
|
|
- Annabella McKinney
- 10 years ago
- Views:
Transcription
1 Crypton: Zero-Knowledge Application Framework David Dahl Project Director Cam Pedersen Principal Engineer Abstract INCOMPLETE DRAFT DO NOT DISTRIBUTE Applications intended to work on multiple devices or those that store large enough amounts of data must save their data to a backend server rather than locally. Privacy of users is typically only protected on the wire with SSL or on the backend with an encrypted database. This leaves user data and communications open to malicious server operators or attackers. Application developers may easily fall into cryptographic mistakes if they attempt to build on primitives themselves. Crypton uses end-to-end encryption, provides application developers with high-level APIs for user accounts, robust data storage, and sharing information between users. We detail the framework s cryptographic structure and its implementation architecture. I. INTRODUCTION Users concern for the privacy of their data has become widespread after numerous data leaks and revelations of widespread government spying [5]. Applications built upon zero-knowledge principals have a competitive advantage in an emulous market. Additionally, as a service operator, it is inherently responsible to protect users data from intrusions by yourself or an adversary. Crypton is a unique way to build applications, primarily because it makes it simple for developers to store data with a server in such a way that the server doesn t know what that data is. Additionally, all Crypton-based applications are built solely on the client, and the server acts as a smart pipe to the database to store and retrieve data for authenticated users. A side effect of this architecture is that working with the framework is not dissimilar to using a backend as a service. Crypton s initial implementation has been built with JavaScript on the client and server. JavaScript was chosen as it is the language of the web and the large body of developers already engaged in JavaScript development. JavaScript has also established itself in desktop and mobile rapid application environments such as Microsoft Windows [1], Cordova [2] and node-webkit [3]. This has led to several design considerations (which are...). In this paper however, we will concentrate on the framework s concepts moreso than its implementation details. These concepts may be used to port the client side to nearly any platform. A. Motivation Moving forward from the success of SpiderOak s desktop backup client, the logical progression is to use the Zero- Knowledge concepts in new ways, specifically in communications applications popular on mobile devices and desktop computers. Internet users today are tracked in unprecedented ways by the advertising juggernaut that exists on the web as well as the constant, blanket surveillance employed by many governments. has always been about as private as sending a post card via the mail service, while some headway has been made in making SSL/TLS the standard way of protecting SMTP, there are glaring gaps. With this in mind, SSL is not ever-present on all servers our browsers connect to, and even if it was, there are massive problems with SSL and the Certificate Authority system as a whole. A few of these issues are Certificate Authorities being tricked into or via intrusion issuing valid certificates that allow a manin-the-middle attack to be almost trivial to pull off, as well as massive zero-day bugs in popular SSL encryption libraries such as OpenSSL. The best defense includes the concept of defense-in-depth [4]. One technique is to use end-to-end encryption as well as an encrypted network channel to move private data back and forth to servers and between users. Making this easy for everyday developers who are not security experts is paramount to its proliferation. This brings us to the User Experience (UX) of cryptography in the realm of both developers and end users of Crypton-based applications. Crypton is primarily an exercise in improving the UX of cryptographic software both from the software engineer s perspective and the end users who use said software. Starting with the framework, we employ JavaScript itself as an improvement in the UX of building more private and secure applications. The Crypton tool set is well known and loved by developers: node.js, Redis and PostgreSQL. The APIs that Crypton provides are elegant and require no special knowledge of cryptographic algorithms, methods, or mathematics. It is designed to be elegant, requiring, for instance, a username, passphrase, and callback function in order to create an account and generate the key ring. Below the surface, all cryptographic operations are hidden. B. Zero Knowledge We define Zero Knowledge as a server s inability to access plaintext data while maintaining its duties to store and secure that data. Crypton does not employ a traditional zeroknowledge proof other than its use of the SRP [6] protocol for user authentication.
2 C. Open Source A primary impetus behind turning this cryptosystem into a framework for application developers is that a number of eyes on one project will find mistakes faster than the same amount of eyes on many projects. Therefore, making the codebase, development process, technical specification, and issue tracker open source is a paramount motivation. D. Related Work 1) SJCL: SJCL is a JavaScript library that implements a set of cryptographic primitives [7]. It is used in Crypton until a native bridge API such as the Web Crypto API has found sufficient footing in browsers. While SJCL was chosen over several other similar libraries, such as CryptoJS [9], for speed and feature concerns, it is still slower than a native option would allow. Additionally, key material is hard to guard from exploits such as XSS in an interpreted environment. We will revisit these concerns later in the paper. 2) Mylar: Mylar [11] is a project with aspirations similar to Crypton - encrypting and decrypting users data in a browser context. However, it also attemps [12] to solve extraneous problems such as server-side keyword search over encrypted documents. We have chosen to keep Crypton as simple as possible and allow developers to add functionality like this by use of Crypton s client-side Container structures. Mylar is intended to be used in the browser as a traditional web application, employing a browser extension to verify dynamically loaded code. Crypton is meant to exist in a packaged mobile or desktop application. 3) End-to-End: Google has created a Chrome extension [16] emulating a PGP system in the browser using OpenPGP [13]. Unlike Crypton, it does not seek to provide a framework for developing applications, but to simplify the addition of end-to-end encryption in existing applications. Like Mylar, it requires a browser extension to use. Its key distribution relies on a web of trust [15], whereas Crypton s relies on manual, out-of-band fingerprint verification. A. Backend II. ARCHITECTURE PostgreSQL was chosen for the main data store for its ACID compliance, transaction handling, and replication options. Redis was chosen as a session store for its speed. Due to the nature of Crypton s composable transactions, sessionauthenticated requests may hit the server quickly or en masse. Node.js was chosen for an HTTP server and transaction processing logic. Its event-driven architecture was desirable, as well as the reduced context switching in development and possibility of isomorphic code that language parity with the client brings. Docker is used to homogenize backend deployment. This leads to ease of use from a development perspective and the hope of decreased server security mistakes that a unified process brings. B. Frontend Crypton clients may be implemented in any context where their code may be packaged and verified. All data is passed RESTfully using JSON over SSL. C. Accounts Each user of a Crypton application must have an Account. 1) Authentication: Authentication is achieved without storing a password equivalent (hash or otherwise) by use of the Secure Remote Password Protocol (SRP) [17]. After a successful SRP negotiation, the client uses the user s password and keypair salt to generate a keypair key with PBKDF2 [18]. A keypair mac key is also generated with the keypair mac salt. The keypair key is used to decrypt the 2) Keyring: Each account has a keyring. Field TABLE I CRYPTON KEYRING STORAGE FIELDS Purpose srp verifier SRP v (password verifier) [17] srp salt SRP s (user s salt) [17] keypair salt salt used to generate keypair key keypair mac salt salt used to generate keypair mac key keypair main keypair encrypted by keypair key keypair mac MAC used to verify keypair pubkey plaintext public key for account container name hmac key key used for HMAC of container names hmac key key used for generalized HMAC operations sign key pub plaintext public key for signature verification sign key private mac salt salt used to generate sign key private mac sign key private ciphertext of private signature key, sign key private mac MAC used to verify sign key private D. Transactions All client operations which affect the state of the database are performed with composable transactions. These are typically hidden from developers - clients abstract common transactions such as account and container creation to provide a transparent API - however they can be used manually to create new atomic action sets. 1) Transaction Chunks: Transaction Chunks are the actions which may be individually or collectively added to a transaction. Data attached to a Chunk is referred to as its payload. It may require specific data or none at all. 2) Transaction Lifecycle: Transactions must first be created - this provides a unique identifier for all future actions regarding that transaction. Transaction Chunks can be added in batch or one at a time. Transactions must have one or more Chunks to be considered valid. When a client is done composing a transaction, it may request the backend to commit it. This is typically a synchronous operation from the client s perspective, but transaction processing is up to the backend s discretion.
3 Name TABLE II CRYPTON TRANSACTION CHUNK TYPES add account set base keyring add container delete container add container session key add container session key share add container record add message delete message Purpose create an account add or change keyring for account create a new container delete an existing container add session key for container add wrapped session key for a given container and account add a new record for given container add a user-to-user message delete a user-to-user message 3) Transaction Processing: As Chunks are added to a transaction, they are added as rows in pre-processing tables in the database. When a client requests that the transaction be committed, it is marked with a commit request time and added to a queue. A separate dequeueing program (or likely a clustered deployment of said program) will watch for and process incoming transactions. All pre-processing rows are pulled from the database which belong to the transaction in question. This data is checked for logical consistency (a record may not be added to a nonexistant container) and stored in temporary tables. It is then checked for semantic consistency (two accounts may not have the same username) and its changes are commited to the database. CLEAN ME UP E. Containers Containers provide the main logical abstraction for data storage in Crypton. On the client, they are meant to resemble (or replicate) the interface of the implementation language s native object format (an Object in JavaScript or a Dictionary in Python). They are meant to be used as a native data structure, with a few exceptions. The first exception is that Containers have names. This name is only known to the client; to interact with the container (through transactions), the client must first HMAC the container name with their account s container name hmac key. The second exception is that they may be saved. When they are saved, a Container Record is created. MORE 1) Container Records: Container Records are defined as discrete changes between versions of a container. When a container is saved on a client, the delta between its last known version is calculated and encrypted. This is sent the server with the add container record transaction chunk. When a container is loaded, all of its encrypted deltas are sent to the client, are decrypted, and the state of the object is rebuilt using them. 2) Container Session Keys: Container Records are encrypted with a per-container key called the Container Session Key. 3) Container Session Key Shares: Container Session Key Shares are wrapped versions of Container Session Key. When a container is loaded, the server will send the client a container session key share for its account, which it must decrypt with its private key, providing a container session key. This allows a container to be shared with another account by a user who already has access to that container. This is done by encrypting the container session key with that user s public key. Giving oneself access to a container and sharing that container are effectively the same operation. F. Messages Messages are an additional data structure Crypton provides for when Containers are not the best option - typically in a situation where you have to send data to another user in a one-off fashion and don t require versioning or sharing. Crypton Messages are implemented traditional public-key messages. 1) Headers: G. Peers Each user account is considered a Peer. A Peer s existence can be ascertained if the querying user knows the exact Peer username: session.getpeer( alice, function(err, peer) ); Once a peer is known, a fingerprint verification is required in order to establish the peer in the user s trusted contacts container [21] A peer cannot be communicated with unless it exists inside the truststatecontainer. 1) Peer Verification: Peer verification is best performed in an out-of-band manner. The best approach here is for an app developer enable the app to send an out of band or sms message to relay the fingerprint of user alice to user bob. Once the Bob has Alice s fingerprint, he can verify it against the peer.fingerprint stored on the Crypton server. With a match, Bob can verify Alice and her peer data (username, fingerprint, public key) can then be stored in Bob s Trust State Container [21] H. Trust State Container The Trust State Container is a normal Crypton container that is generated during account generation. This conatiner is used to keeo track of each peer that a user verifies out of band via a fingerprint sent over SMS, , or perhaps even collected vi a QRCode [14]. These peer/fingerprint APIs and verification steps (especially if used in an out of band manner), allow for a system that can detect changed fingerprints on the server in order to warn users that the peer they want to communicate with might be an imposter. New Metaphors Crypton s peer verification and contact storage mechanisms include an effort to create new metaphors
4 in privacy-centered applications. Instead of using terms like Fingerprint and Public Key, we want to find a metaphor that everyday Internet users better understand. Our most recent API includes an object called Card. Card can generate an ID Card for each user that can be sent out of band as an SMS or attachment. This ID card has a fingerprint on it, but also includes the username, a QRCode and an Identigrid. The Identigrid is a 4X4 square color grid that translates the plain text fingerprint to colors, making it easier to quickly verify it. Naturally, the use of a QRCode [14] allows developers to nearly automate the fingerprint verification and key exchange. We strongly encourage developers to use the QRCode as it allows for more automation. The Crypton team has planned for some UX research in 2015 around the Identigrid concept versus manual fingerprint verification of long strings. Threat Model I. Assumptions Crypton has initially been developed in JavaScript, however, there are no apparent difficulties in porting these concepts to a another language. In its use of JavaScript, it could be easily assumed that Crypton was meant to be used in a web browser - this is incorrect. Browsers are beset by a problem of unverifiable code delivery in that users cannot verify that the code they received is as intended. Therefore, it is only recommended to use Crypton in packaged applications. Tools such as Cordova or node-webkit are recommended for packaging Crypton-based applications. J. Guarantees K. Threats 1) IP storage: 2) Peer graph analysis: 3) Container access frequency analysis: L. Key Distribution III. PERFORMANCE IV. ADDITIONAL CONSIDERATIONS A. Federation B. Advertisement V. USE CASES This section could grow too large. Let s get rid of it? Fig. 1. Identigrid Fig. 2. ID Card with Photo The basic concept is that Bob needs a copy of Alice s ID Card and Alice needs a copy of Bob s in order to establish a private communications channel. With the plain text fingerprint, Identigrid, QRCode (and perhaps a photo), the verification of a peer becomes a familiar step to the vast majority of users who understand what an ID card in the physical realm is. A. Private Diary B. Encrypted Search C. Private Location Sharing A. Container Compaction VI. FUTURE WORK B. Multiple Client Implementations C. Hosted Backend D. Zero Knowledge Payments The conclusion goes here. VII. CONCLUSION VIII. CALL TO ACTION Modern application developers have the 1 new found responsibility to protect their users data. Whether you utilize Crypton or not, the authors implore you to protect yourself and your users from adversaries by encrypting all data, not only on the wire but at rest. ACKNOWLEDGMENT The authors would like to thank... 1 regrettably
5 REFERENCES [1] [2] [3] [4] in depth %28computing%29 [5] [6] [7] [8] [9] [10] scripting [11] [12] [13] [14] [15] [16] making-end-to-end-encryption-easier-to.html [17] [18] [19] [20] H. Kopka and P. W. Daly, A Guide to LATEX, 3rd ed. Harlow, England: Addison-Wesley, [21] A default Crypton container that holds all trusted contact usernames and public key fingerprints
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Exam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
IPSL - PRODIGUER. Messaging Platform Design
IPSL - PRODIGUER Messaging Platform Design I - Platform Overview Aujhourd hui TGCC IDRIS CINES SSH IPSL User @ Command Line Demain ( = Aujhourd hui + Messaging Platform) IPSL IPSL TGCC IDRIS CINES CNRM
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
ManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Achta's IBAN Validation API Service Overview (achta.com)
Tel: 00 353 (0) 14773295 e: [email protected] Achta's IBAN Validation API Service Overview (achta.com) Summary At Achta we have built a secure, scalable and cloud based API for SEPA. One of our core offerings
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
True Key by Intel Security
True Key by Intel Security Security White Paper 1.0 True Key by Intel Security is the easier, safer way to unlock your digital world. This White paper provides a technical overview of the comprehensive
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
