A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION APPROACH
|
|
|
- Doris Joseph
- 10 years ago
- Views:
Transcription
1 A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION APPROACH Shadi R. Masadeh 1, Ahmad Azzazi 2, Bassam A. Y. Alqaralleh 3 and Ali, Mousa.Al Sbou 4 1 Computer Networks Department, Isra University, Amman, Jordan 2 Computer Information Systems Department, Applied Science University, Amman, Jordan 3 Computer Science Department, Al-Hussein Bin Talal University, Ma'an, Jordan 4 Computer Science Department, Al-Hussein Bin Talal University, Ma'an, Jordan ABSTRACT Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats can be challenging. Verifying data integrity and authentication are essential security services in order to secure data transmission process. In this paper we propose a novel security technique which uses new encryption and decryption algorithms to achieve authenticated communication and enhanced data integrity. The proposed technique is very complex for attackers to decode, and it is applicable to client-server architecture. KEYWORDS Authentication, PGP, swifi, HMAC, Encryption\Decryption, integrity. 1. INTRODUCTION ("Internet security and encryption," 2012) All Network users aim to access information and transfer data safely. To ensure secure transmission of information between the parties; a group of challenges must met. We confined these challenges to three areas: data Integrity, authentication and privacy (Alaidaros, Rasid, Othman, & Abdullah, 2007). Privacy refers to secure and valuable data (Diffie & Hellman, 1979) which should not be accessible unless the parties concerned are allowed to do so. Many techniques can be used to maintain and improve user privacy such as cryptography techniques (Griffin, 1998), passwords and firewall. In an unsecure environment, it is easy to break through privacy in several ways. For example, viewing data without certificate, behavior scanning or movement tracking (Hajny, Pelka, & Zeman, 2010) and eavesdropping. Recently, there is an attempt to break the privacy of the users on encrypted channels (Dusi, Gringoli, & Salgarelli, 2008). Integrity refers to the consistency and accuracy of data to ensure that unauthorized parties are prevented from modifying data Authentication (Serwan Waleed, 2011). As a result, the data which is received must be to be the same as the data sent. Protecting data transmission process is necessary to avoid any intentional or unintentional changes of these data. Any damage or distort of data will affect the feasibility of these data or information; it becomes not beneficial and not DOI : /ijnsa
2 safe to use. Data can use multiple techniques such as encryption, Digital signature and Checksum to avoid any damage or distort. Authentication is the process of verifying if a user or entity or device is who claims to be. In other words it s a combination of verification and Identification. Authentication falls into three categories (Al-Assam, Sellahewa, & Jassim, 2010): Knowledge factors: something you know (e.g. Password, personal identification number) Ownership factors: something you have (e.g. Smart Card, cell phone, ID card) Inherence factors: something you are (e.g. fingerprint, signature, voice, iris, biometric). To enhance security, different types of authentication are combined. The client, host and transmission channel are the locations where authenticators can be attacked (O'Gorman, 2003). In this paper, we propose a novel approach to enhance the data integrity, authentication and privacy depending on some encryption / decryption methods by combining PGP, swifi and HMAC Systems. The proposed system provides the protection and safety to secure data transfer across networks against spoofing, tampering, repudiation, security attacks and Information disclosure. The rest of this paper is organized as follows: Section 2 describes the related work. Proposed Authentication model is discussed in Section 3. Finally, conclusions are drawn in section RELATED WORK According to (American Bankers, 2000), the HMAC is a technique that uses cryptographic hash functions for message authentication. This technique combines any iterative cryptographic with a shared secret key. The HMAC has two parameters, the message and a shared secret key which is known only to the sender and receiver. The sender uses HMAC to produce a value which is represents the combination of the secret key and the message input, the new value is called MAC the sender appends the MAC message and sends all to the receiver. The receiver uses HMAC and a shared secret key, that the sender used before, by applying the MAC algorithm to the received message and compares the result with the received MAC. We can insure that the message has been correctly received if the two values match. This process also provides assurance that the message comes from sender who shares the key. (Krovetz, 2006) in their paper mentioned that only the sender and receiver know the hash function which is used by sender to hash message and produce the hash value, then the sender encrypts the resulting hash value by using cryptographic function to create a message tag which is sent to receiver with the message. On the receiver s side, the user needs to verify that the receiver s tag is valid for the receiver message based on the hash function and cryptographic key which are known only to the sender and receiver. (Aljawarneh, Masadeh, & Alkhateeb, 2010), proposed a secure Wireless Fidelity (swifi) system which provides more efficiency, security and authentication for transmitted data over the network. Basically, swifi are based on HMAC Algorithm. 18
3 There are many steps to use swifi : First, the swifi is split into two parts: The first part is the plain text for key purposes, the second part is split into four pieces; to generate and encrypt the key using logical OR-ing and bit shifting of the data in a certain pattern in the four portions. In order to generate the key, encrypt the first part and disrupt the probabilistic phenomena of the letters in the language. Finally, within the blocks the encrypted data is shuffled to make sure that there is no similarity with original data. (Aljawarneh et al., 2010) Pretty Good Privacy, is one of the most important encryption and security applications that use efficient and confidential algorithms to secure data transmission. The PGP as a encryption program founded by Phil Zimmerman on 1991 provides complete verification and encryption for message files (McLaughlin, 2006). The PGP is considered the most key cryptographic used by the public with PGP in a secure manner so there is no need for any specific infrastructure (Chadwick, Young, & Cicovic, 1997).The security of PGP Model is trusted since it is an open Source so professional people can close any weaknesses if found, it is based on symmetric-key cryptography and use combination of data compression, hashing and public-key cryptography (Kurniawan, Albone, & Rahyuwibowo, 2011). (Abdul-Rahman, 1997),(Guibing, Jie, & Vassileva, 2011) The PGP is the first successful attempt of a free cryptographic model which is available for the public. The sender who has the private key is able to create a digital signature for corresponding public key. Digitally, PGP gives other users the ability to sign certificates that they think it is authentic, so the owner of the public key is an owner of the certificate. To verify a public key, the user needs to check if there are any digital signatures that are signed by the trusted users. PGP compresses the message and creates a public key and a private key for the sender through cryptography software. When the plain text is encrypted, the public key is encrypted to the receiver's private key which can be used by the receiver to decrypt the message (Abdul-Rahman, 1997). Although the PGP is considered as one of the best encryption techniques, it does have some disadvantages. The PGP process is considered a complex process to use on a regular basis since it is very difficult for many people to grasp the meaning of Cryptography. Also, The PGP is a twoway street that the sender and the recipient must use it, otherwise the recipient will not be able to view the encrypted data(gibson, 2002). Managing keys for a new user using PGP will be a challenge. Lost or corrupted keys lead to high risk and will not allow users to view encrypted data. 19
4 3. PROPOSED AUTHENTICATION MODEL Figure 1: Authentication model in Sender side In this method the sender submits a plain text message, and uses an HMAC generator to generate an HMAC for to the text. A local program generates a secure value (S_Value) which is in turn concatenated with the HMAC that is previously generated. The message is then fed to AES encryptor that generates an encrypted version of the concatenated (HMAC II S_VALUE) and concatenates the result with the original plain text message. The message is then encrypted using PGP using the receiver public key to generate the PGP encrypted message. The encrypted message is then further encrypted using swifi encryptor to generate the final message in order to be sent to the receiver as depicted in the steps below: 1- Enter the message (plain text) and then insert the Hash message authentication code (HMAC) and secured value (S_value) to the original message. 2- Concatenate the HMAC with S_value. 3- Encrypt the result from step 2 using private key as follows C ( Eprk (HMAC II S_value)) 4- Concatenate the result from step 3 with the original message (plain text) as follows: 20
5 C (P II (Eprk (HMAC II S_value))). 5- Encrypt the result from step 4 using PGP as follows: C Epbk (P II ( Epr (HMAC II S_value))). 6- Encrypt the result from step 5 using swifi as follows: C E swifi [Epbk (P II ( Epr (HMAC II S_value))) ]. Figure 2: Authentication model in Receiver side On the receiver's side, the receiver uses the swifi decryptor to get the PGP encrypted message, which is then decrypted using the sender's Public key with the receiver's private key. The receiver then uses the AES decryptor to retrieve the encrypted message that contains the HMAC and S_VALUE at the end of the message. The receiver then extracts the HMAC and S_VALUE, and generates a new HMAC from the received message. The receiver then compares both HMACs. If both HMACs match, the message is authenticated and has not been altered, or otherwise, the receiver sends the sender a request to resend the message. The full process is illustrated by the following steps: 1- Receive the message (cipher text) from the sender as follows: 21
6 C E swifi [ Epbk ( P II ( Eprk (HMAC II S_value))) ] Then the receiver decrypts the formula as follows: P D swifi [ Epbk ( C II ( Eprk (HMAC II S_value))) ] 2- Decrypt the result from step1 using PGP as follows: P Dpbk ( C II ( Eprk (HMAC II S_value))). 3- Decrypt the result from step 2 as follows: P Dprk (HMAC II S_value))). 4- Extraction the HMAC with S_value. 5- Compare the plain text (original message) from sender side with the message from receiver side. If there is no alteration of the message was found then the message is authenticated. 4. CONCLUSION A novel design approach for authentication system was presented in this paper. Our approach can reduce the security risk across networks by combining PGP, swifi and HMAC systems. The proposed system is expected to present, protect, and enhance the data integrity, Authentication and privacy. Also, it increases the strength against network risks. Furthermore, our authentication system is very complex, which means that it is almost impossible to decrypt the method. REFERENCES [1] Abdul-Rahman, A. (1997). The PGP Trust Model. EDI-Forum: The Journal of Electronic Commerce, 10(3), doi: citeulike-article-id: [2] Al-Assam, H., Sellahewa, H., & Jassim, S. (2010). Multi-factor biometrics for authentication: a false sense of security. Paper presented at the Proceedings of the 12th ACM workshop on Multimedia and security, Roma, Italy. [3] Alaidaros, H. M., Rasid, M. F. A., Othman, M., & Abdullah, R. S. A. (2007, May 2007). Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase. Paper presented at the Telecommunications and Malaysia International Conference on Communications, ICT-MICC IEEE International Conference on. [4] Aljawarneh, S., Masadeh, S., & Alkhateeb, F. (2010). A secure wifi system for wireless networks: an experimental evaluation. NETWORK SECURITY(Jun), [5] American Bankers, A. (2000). Keyed hash message authentication code : X Wash., D.C.: ABA. [6] Chadwick, D. W., Young, A. J., & Cicovic, N. K. (1997). Merging and extending the PGP and PEM trust models-the ICE-TEL trust model. Network, IEEE, 11(3), doi: / [7] Diffie, W., & Hellman, M. E. (1979). Privacy and authentication : An introduction to Cryptography. Proceedings of the IEEE,
7 [8] Dusi, M., Gringoli, F., & Salgarelli, L. (2008, 8-10 Sept. 2008). A Model for the Study of Privacy Issues in Secure Shell Connections. Paper presented at the Information Assurance and Security, ISIAS '08. Fourth International Conference on. [9] Gibson, D. (2002). Security Risks and How To Reduce Them [10] Griffin, J. A. (1998, Jun 1998). Privacy and security in the Digital Age. Paper presented at the Technology and Society, ISTAS 98. Wiring the World: The Impact of Information Technology on Society., Proceedings of the 1998 International Symposium on. [11] Guibing, G., Jie, Z., & Vassileva, J. (2011, Aug. 2011). Improving PGP Web of Trust through the Expansion of Trusted Neighborhood. Paper presented at the Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on. [12] Hajny, J., Pelka, T., & Zeman, V. (2010, July 2010). Privacy protection for user authentication. Paper presented at the Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on. [13] Internet security and encryption. (2012) Retrieved 18/12/2012, from [14] Krovetz, T. (2006). Message Authentication on 64-bit Architectures. IACR Cryptology eprint Archive, 37. [15] Kurniawan, Y., Albone, A., & Rahyuwibowo, H. (2011, July 2011). The design of mini PGP security. Paper presented at the Electrical Engineering and Informatics (ICEEI), 2011 International Conference on. [16] McLaughlin, L. (2006). Philip Zimmermann on What's Next after PGP. Security & Privacy, IEEE, 4(1), doi: /msp [17] O'Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12), doi: /jproc [18] Serwan Waleed, J. (2011). IMPROVEMENT OF DATA INTEGRITY USING DIFFERENT ENCRYPTION ALGORITHMS. IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND تالاصتالاو تابساحلا ةسدنهل ةيقارعلا ةلجملا CONTROL & SYSTEMS ENGINEERING.1-6,(2)11,مظنلاو ةرطيسلاو Authors Shadi R. Masadeh received a BSc degree in Computer Science and Computer Information System in 2000 and MSc degree in Information Technology in with a Thesis titled "A Mathematical Approach for Ciphering and Deciphering Techniques" After that, I received PhD from department of Computer Information System in 2009 with a Thesis titled "A New Embedded Method for Encryption/Decryption Technique Using Self Approach" My research interests including E- learning Management and Security Issues, Encryption and Decryption Systems. Networking and Wireless security. Currently, I'm working at Al-ISRA University in Computer Networks Department as assistant Prof. I have submitted a number of conference papers and journals. Ahmad Azzazi is an assistant professor in the Department of Computer Information Systems at the Applied Science University. Dr. Azzazi s research interests include software engineering frameworks, speech processing, software security, expert systems and expert systems. 23
8 Bassam A. Y. Alqaralleh received a BSc degree in Computer Science in 1992, graduate Diploma in Computer Information Systems in 2002 and Masters degree in Computer Science in After that, I received PhD from University of Sydney in 2010 with a Thesis titled " Addressing Data and Access Skew Problems in Data-Indexed Overlays". My research interests including Distributed Systems, Load-Balancing, Networking, Security Systems. and Wireless security. Currently, I'm working at Al-Hussein Bin Talal University in Computer Science Department as assistant Prof. I have published a number of conference papers and journals. Ali Mousa Al Sbou has got the BSc degree in computer science from Mutah University, Jordan in 2001.Andhe has got master degree in information technology from Universiti Utara Malaysia, Malaysia in He is works as a Computer lab supervisor at Al Hussein Bin Talal University, Jordan. 24
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter
Balamaruthu Mani Supervisor: Professor Barak A. Pearlmutter Plain email text Mail Server Mail Server Encrypted on transfer Encrypted on transfer Sender Email Communication Encryption over network Recipient
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
A Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 1. Abstract Wired Equivalent Privacy (WEP) was the first encryption scheme used for protecting wireless traffic. It consisted of a private
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Network Security. Network Security. Security in Computer Networks
Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Secure Network Communication Based on Text-to-Image Encryption
Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
AMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
