KeyEscrowinMutuallyMistrustingDomains?

Size: px
Start display at page:

Download "KeyEscrowinMutuallyMistrustingDomains?"

Transcription

1 KeyEscrowinMutuallyMistrustingDomains? Abstract.Inthispaperwepresentakeyescrowsystemwhichmeets L.Chen,D.GollmannandC.J.Mitchell possiblerequirementsforinternationalkeyescrow,wheredierentdomainsmaynottrusteachother.inthissystemmultiplethirdparties, RoyalHolloway,UniversityofLondon Egham,SurreyTW200EX,UK InformationSecurityGroup risedagenciesintherelevantdomainswithwarrantedaccesstotheusers' communications.weproposetwoescrowedkeyagreementmechanisms, ofprovidinguserswithkeymanagementservicesandprovidingautho- whoaretrustedcollectivelybutnotindividually,performthedualrole bothdesignedforthecasewherethepairofcommunicatingusersare mains.thesecondmechanismusesatransferableandveriablesecret ahidden`shadow-key'.therstmechanismmakesuseofasingleset ofkeyescrowagenciesmoderatelytrustedbymutuallymistrustingdo- itmoredicultfordeviantuserstosubverttheescrowedkeybyusing thatallentitiesareinvolvedinthekeygenerationprocesshelpsmake indierentdomains,inwhichthepairofusersandallthethirdparties sharingschemetotransferkeysharesbetweentwogroupsofkeyescrow agencies,whereonegroupisineachdomain. jointlygenerateacryptographickeyforend-to-endencryption.thefact usertracinordertocombatcrimeandprotectnationalsecurity.akeyescrow dictoryrequirements.ontheonehanduserswanttocommunicatesecurelywith 1Introduction 1.1Keyescrowinmutuallymistrustingdomains Inmodernsecuretelecommunicationssystemstherearelikelytobetwocontra- systemisdesignedtomeettheneedsofbothusersandgovernments,wherea otherusers,andontheotherhandgovernmentshaverequirementstointercept toprovidethelawenforcementagenciesofalltherelevantcountries,e.g.the keyescrowsystemshaverecentlybeenproposed,andforanoverviewoftheeld, thereaderisreferredto[4]. authorised.followingtheusgovernment'sclipperproposals,[1],anumberof (orasetofagencies)andlaterdeliveredtogovernmentagencieswhenlawfully cryptographickeyforusercommunicationsisescrowedwithakeyescrowagency?thisworkhasbeenjointlyfundedbytheukepsrcunderresearchgrant GR/J17173andtheEuropeanCommissionunderACTSprojectAC095(ASPeCT). Whenuserscommunicateinternationally,thereisapotentialrequirement

2 originatinganddestinationcountriesforthecommunication,withwarranted accesstotheusertrac.forexample,aglobalmobiletelecommunicationssystemmightprovideanend-to-endcondentialityservicetotwomobileusersin morecomplicated,thesetwocountrieswilltypicallynottrustoneother(such twodierentcountries,andlawenforcementagenciesinboththesecountries lawenforcementagencyinonecountrymightnotwishtolettheircounterpart mightindependentlywishtointerceptthesecommunications.tomakematters whomaybegiventherighttoaccesscommunicationswithinasingledomain. inanyothercountryknowthataparticularuser'scommunicationsarebeing domainsarereferredtoasmutuallydistrustingcountriesin[6]);forexample,a beresponsibleformaintainingalltheinformationnecessarytoprovideaccessto interceptionagencies,whenpresentedwiththeappropriatelegalauthorisation. FinallywerefertoescrowagenciesorTrustedThirdParties(TTPs)whowill interceptionauthoritieswherewemeanbodiessuchaslawenforcementagencies eralitywerefertodomainsinsteadofcountriesthroughout.wealsoreferto intercepted. outthatthecountriesinvolveddonottrustoneanother;forthemaximumgen- Wenowstateourrequirementsforkeyescrowinaninternational(i.e.a Weareconcernedherewithinternationalkeyescrow,andweassumethrough- multi-domain)context. 1.Nodomaincanindividuallycontrolthegenerationofanescrowedkey,and hencetheescrowedkeycannotbechosenbyentitiesinonlyonedomainand 1.2Priorapproaches 3.Theentitiesinanydomaincanensurethecorrectnessandfreshnessofthe 2.Theinterceptionauthoritiesinanydomaincangainaccesstoanescrowed capableofbeingescrowedinallrelevantdomainsindependently. escrowedkey. keywithoutcommunicatingwithanyotherdomain,i.e.thekeyhastobe thentransferredtotheotherdomain. munications.asessionkeyforend-to-endencryptionisestablishedbasedon providingthetwointerceptionagencieswithwarrantedaccesstotheusers'com- domains,thentherelevantpairofttps(oneineachdomain)collaboratively Jeeries,MitchellandWalker[8]recentlyproposedanovelkeyescrowmechanismsuitableforinternationaluse,calledthe`JMW'mechanismforshort.In thatschemeeveryuserhasanassociatedttp.iftwousers,communicating acombinationofasecretkeysharedbetweenthemandthereceiver'sname, andanotherasymmetrickeyagreementpairfortheotheruser(thesender)is generatedbyhimself.thereceivercomputesthesessionkeybycombininghis (thereceiver)isseparatelycomputedbybothttps(oneineachdomain)using Die-Hellmankeyexchange[5].Anasymmetrickeyagreementpairforoneuser witheachothersecurelybyusingend-to-endencryption,arelocatedindierent performthedualroleofprovidingtheuserswithkeymanagementservicesand privatekey(transferredsecurelyfromhisownttp)withthesender'spublic

3 amongtheusers,ttpsandinterceptionagencies. above.however,itrequiresthefollowingassumptionsabouttrustrelationships sessionkeyfromthettpinthesamedomain. keybycombininghisprivatekeywiththereceiver'spublickey(obtainedfrom thesender'sownttp).interceptionagenciesineachdomaincanretrievethe key(sentwiththeencryptedmessage).thesendercomputesthesamesession 2.EachTTPbelievesthattheuser,asasender,willprovidethecorrectpublic 1.EachuserbelievesthattheirownTTP(aswellastheTTPsofanyother Notethatthismechanismmeetsthethreerequirementsforkeyescrowlisted 3.EachTTPbelievesthattheotherTTPwillcontributeproperkeyagreement 4.EachinterceptionagencybelievesthattheTTPinitsdomainwillprovide key(matchingthesecretkeyheusesforsecuringmessageshesends). valuesandcerticates,andwillnotrevealtheescrowedkeyillegally. thecorrectescrowedkeywhenrequested. andcerticates,andwillnotrevealtheescrowedkeyillegally. userswithwhichtheycommunicate)willissueproperkeyagreementvalues contributionstoanescrowedkeyandtorevealthekeylegally,andusersalso domain. 1.3Ourcontribution Inthispaperwesupposethat,insomeenvironmentswhereinternationalkey escrowisrequired,ttpsmaynotbetrustedindividuallytoprovideproper whichrequiresakeyescrowagency(oragencies)tobetrustedbymorethanone In[6],FrankelandYunggiveadierentschemeforinternationalkeyescrow, maynotbetrustedtoprovidepropercontributionstoanescrowedkey. 1.Theschemesuseasetofmoderatelytrustedthirdpartiesinsteadofasingle Weconsidertworelatedkeyescrowmechanismswiththefollowingproperties. Forthepurposesofthispaper,moderatelytrustedthirdpartiesaretrusted collectively,butnotindividually,byusers,interceptionagenciesandanother setofttps. Keysplittingschemeshavepreviouslybeenusedforsplittinganescrowed TTP,inaneorttopreventasingleTTPfromcorruptinganescrowedkey. 2.Theyuseaveriablesecretsharingschemeinordertopreventdeviantusers Suchaschemeallowsanysubsetofkofthenescrowagenciestoaectthe keyintonsharesescrowedbynagenciesinproposedkeyescrowsystems 3.Theyuseananeexpansibleveriablesecretsharingschemetoletusers fromrecoveringacompletekey. (e.g.see[4,9,11,12]);wealsomakeuseofakoutofnthresholdscheme. recoveryofacompletekey,butprohibitsanygroupoffewerthankagencies fromsubvertingthesecretsharingschemebyprovidingimpropershares.such andthirdpartiesjointlygenerateanescrowedkey,thuspreventingdeviant aschemehaspreviouslybeenadoptedinakeyescrowsystemtoletagroup ofkeyescrowagenciesverifythattheyhavevalidshares[9]. usersfromobtaininga`shadow-key'(notavailabletotheescrowagency).

4 atransferableveriablesecretsharingschemeandananeexpansibleveriable 4.Thesecondschememakesuseofatransferableveriablesecretsharing andyung'sidea,[6],makesuseofasinglegroupofkeyescrowagenciesmoderatelytrustedbymutuallymistrustingdomains.thesecondscheme,whichis maynottrusteachother. secretsharingschemebasedontheshamirsecretsharingscheme,[15],andthe Pedersenveriablesecretsharingscheme,[13].Wethenproposetwomechanisms forinternationalkeyescrowinsection3.therst,whichincorporatesfrankel Theremainderofthepaperissubdividedasfollows.Insection2,wepresent schemetotransfersharesbetweentwosetsofkeyescrowagencieswhich analternativetothejmwmechanism,adoptsthetransferableandveriable keybyusingtheaneexpansibleveriablesecretsharingscheme. Inbothmechanisms,usersandkeyescrowagenciesjointlygenerateanescrowed secretsharingschemetotransfersharesbetweentwosetsofmoderatelytrusted keyescrowagencies,onesetwithineachoftwomutuallymistrustingdomains. 2VeriableSecretSharing InthissectionwerstbrieydescribetheShamirsecretsharingscheme[15] domains.weconcludebygivingtwoopenquestions. trustedthirdparties,potentiallyuntrustworthyusersandmultiplemistrusting ofentityinvolvedinaninternationalkeyescrowsystem,namelymoderately Insection4,weconsiderpossibletrustrelationshipsamongthethreetypes schemes.thisworkwillprovidethebasisforthekeyescrowschemesdescribed functionofasharedsecret,usingmodicationsoftheshamirandpedersen 2.1TheShamirscheme subsequently. transferasharedsecretbetweentwodomains,andalsohowtoshareanane andthepedersenveriablesecretsharingscheme[13].wethendiscusshowto A(k;n)-thresholdsecretsharingschemeisaprotocolinwhichadealerdistributespartialinformation(ashare)aboutasecrettoeachofnparticipants suchthat Supposepandqarelargeprimessuchthatqdividesp?1,andgisanelementof anygroupofatleastkparticipantscancomputethesecret. nogroupoffewerthankparticipantscanobtainanyinformationaboutthe becomputedmodulop. orderqinzp.itisassumedthatp,qandgarepubliclyknown.theseparameters willbeusedthroughoutthispaper.unlessotherwisestatedallarithmeticwill WenowdescribetheShamir(k;n)-thresholdsecretsharingscheme,[15]. secret,and

5 Pn(wheren<q)thedealerchoosesapolynomialofdegreek?1: wheref2zq[x]anda0=s.eachparticipantpi(1in)receivessi=f(xi) fori6=j). ashisprivateshare,wherexi2zq?f0gispublicinformationaboutpi(xi6=xj, LetthesecretsbeanelementofZq.InordertodistributesamongP1,..., P2,...,Pk)canndf(x)bytheinterpolationformula, Anykparticipants(withoutlossofgeneralityweassumethattheyareP1, f(x)=kxi=1(yh6=ix?xh f(x)=a0+a1x+:::+ak?1xk?1; Thus s=f(0)=kxi=1(yh6=ixh xi?xh)f(xi)=kxi=1(yh6=ix?xh xh?xi)si: xi?xh)si: ThissecretcanbedistributedtoandveriedbyP1,...,Pn,inthefollowingway: Assumethatadealerhasasecrets2Zqandcorrespondingpublicvalueh=gs. 2.2ThePedersenscheme 1.ThedealercomputessharessiusingtheShamirsecretsharingschemebyrst 2.ThedealersendsthesharesisecretlytoPi(1in)andbroadcastsa a0=sandthencomputingsi=f(xi)(1in).herexiispublic choosingapolynomialf(x)=a0+a1x+:::+ak?1xk?1overzqsatisfying 3.EachPi(1in)computeshi=k?1 informationaboutpiaspreviously. vericationsequencev=(ga0;ga1;:::;gak?1) toallnparticipants. IfthisdoesnotholdthenPibroadcastssiandstops.OtherwisePiaccepts theshare. andverieswhether hi=gsi: Yj=0(gaj)(xi)j; 4.Anykparticipants,whohaveacceptedtheirshares,canndsasdescribed intheshamirsecretsharingschemeabove.

6 1<kminfm;ng. ablesecretsharingscheme,wherek,m,andnarepositiveintegerssatisfying ipants.westartbystatingourrequirementsfora(k;m;n)-transferableveri- 2.3Transferableveriablesecretsharing Wenowconsiderhowtotransferasharedsecretbetweentwogroupsofpartic- TheparticipantsQj(1jn)mustbeabletoverifytheirownprivate NogroupoffewerthankparticipantsinQ1,...,Qncanobtainanyinformationabouts. AnygroupofatleastkparticipantsinQ1,...,Qn,whohaveacceptedtheir AsecretssharedbymparticipantsP1,...,Pmneedstobetransferredto, shares,cancomputes. andthensharedby,anothernparticipantsq1,...,qn. shareswithoutcommunicatingwithotherparticipantsinthesamedomain. Algorithm1AssumethatmparticipantsPi(1im)shareasecrets2Zq ShamirandPedersenschemes. usingthepedersenscheme.thissecretcanbetransferredtoandveriedby anothernparticipantsqj(1jn),inthefollowingway: Wenowpresentatransferableveriablesecretsharingschemebasedonthe 1.EachPi(1im)computesnewsharessij(1jn)usingtheShamir 2.Pi(1im)sendssijsecretlytoQj(1jn)andbroadcastsa secretsharingschemeby: rstchoosingapolynomialfi(x)=ai0+ai1x+:::+ai(k?1)xk?1overzq 3.OnreceiptofsijandVi(1im),Qj(1jn)computes vericationsequencevi=(gai0;:::;gai(k?1)) toallnparticipantsq1,...,qn. thencomputingsij=fi(xj).herexjispublicinformationaboutqj. satisfyingai0=si,and Ifthisdoesnothold,Qjbroadcastssijandstops.OtherwiseQjacceptsthe andverieswhether hij=k?1 hij=gsij: Yl=0(gail)(xj)l; Theorem2Theabovealgorithmhasthefollowingproperties. share.

7 Proof 1.AnygroupofatleastkparticipantsinQ1,...,Qn,whohaveacceptedtheir 2.NogroupoffewerthankparticipantsinQ1,...,Qncanobtainanyinformationaboutsi(1im)ands. sharesfollowingalgorithm1,canndsi(1im),andhencecompute asusedtoprovethesamestatementsforthepedersenscheme. 3.EachQj(1jn)canverifysij(1im)andgswithoutcommunicatingwithotherparticipantsinthesamedomain. Allthreepartsofthetheoremholdbyusingpreciselythesamearguments s. TTPsinonedomaintoanothersetofTTPsinaseconddomaininMechanism 7describedinthenextsection.Thetwogroupsofparticipantsdonothaveto Thisschemewillbeusedtotransferapartialescrowedkeyfromasetof trusteachother.iffewerthankparticipantsinanydomainfollowthescheme, thesecrettransfercannotbesuccessful,butnoonecansubvertthealgorithm byforcinganyoneelsetoacceptafraudulentsecret. 2 Wenowconsiderananeexpansionofthresholdsecretsharing.Westartby 2.4Aneexpansibleveriablesecretsharing statingourrequirementsfor`aneexpansion'. ontheshamirandpedersenschemes. Asecrets2ZqissharedbymparticipantsP1,...,Pm.Itsanefunction Algorithm3AssumethatmparticipantsPi(1im)shareasecrets2Zq Nogroupoffewerthankparticipantscanobtainanyinformationaboutw. Anygroupofatleastkparticipantscancomputew. Wenowpresentananeexpansibleveriablesecretsharingschemebased w=as+b,wherea;b2zqanda6=0,needstobesharedbythesame usingthepedersenscheme,andknowpublicinformationa2zq?f0gand participants.hereaandbarepublicinformationaboutpi(1im). b2zq.anewsecretw=as+b2zqcanbesharedandveriedbythesamem participantswithoutcommunicatingwithoneanother.thenewshareswiare Theorem4Theabovealgorithmhasthefollowingproperties. Thecorrespondingpublickeysare gwi=gasi+b=(gsi)agb;and gw=gas+b=(gs)agb: wi=asi+b:

8 1.Itmeetstherequirementsforaneexpansiblesecretsharing. escrowedkeyinmechanism5andmechanism7describedbelow.because Proof 2.Pi(1im)canverifywi(1im)andgwwithoutcommunicating thecontributionisnotknowntousers,itisdicultfortheuserstosubvertthe toestablishthepropertiesofthepedersenscheme. Thisschemewillbeusedtoletthirdpartiesprovideancontributiontoan Thistheoremagainfollowsusingpreciselythesameargumentsasareused withotherparticipants. escrowedkeybyusingahidden`shadow-public-key',thecorresponding`shadowprivate-key'ofwhichcannotbecomputedbyusingarealkeypairand`shadowpublic-key'[9]. 2 Wemakethefollowingassumptionsforourmodelofaninternationalkeyescrow 3.1Assumptions system. 3Escrowedkeyagreement TwoentitiesAandB,locatedinmutuallymistrustingdomains,wantto Intherstscheme(Mechanism5)asinglesetofTTPsfT1,...,Tmgare ThecommunicationsbetweenAandBhavetomeetpotentiallegalrequirementsforwarrantedinterception.Interceptionagenciesineachdomainare shareanysecret. beforetheauthenticationandkeydistributionprocessingstartstheydonot communicatesecurelywitheachother.forthispurposetheyneedtoverify oneanother'sidentityandestablishasharedsessionkeykab,although agenciesfortheinterceptionagenciesinbothdomains.inthesecondscheme usedasbothmultipleauthenticationserversfortheusers,andkeyescrow butmayrequireaccesstothesessionkeykab. notactivelyinvolvedintheauthenticationandkeydistributionprocedures, 3.2Mechanism1 interceptionagenciescollectively,butnotindividually. ineachdomain,areusedasmultipleauthenticationserversfortheusers andkeyescrowagenciesfortheinterceptionagencies.inbothcasestheyare KAB,andescrowingthesessionkey.Theyaretrustedbyboththeusersand responsibleforverifyinga'sandb'sidentities,establishingasessionkey (Mechanism7)twosetsofTTPsfT1,...,TmgandfU1,...,Ung,onegroup [5]andtheveriablesecretsharingschemesdescribedinsection2.Inthemechanism,AandBareusersinseparatedomains,andmmoderatelyTTPsT1,..., ThisescrowedkeyagreementschemeisbasedonDie-Hellmankeyexchange

9 positiveintegerk(km),anysetofkttpscancomputethesessionkey andgenerateaprivateintegerstab.theschemeisdesignedsothatforsome establishedbetweenaandb,butnogroupofk?1orlessttpscanderiveany functionfshalltakeasinputthesharedsecretkeyandthenamesofaandb, TTPsagreeacommonlyheldsecretkeyK(T1;:::;Tm)andafunctionf.This ticatedchannelswithti(1im).asinthejmwmechanism,thesem Tmworkforbothusersasauthenticationservers,andforinterceptionagencies inbothdomainsaskeyescrowagencies.weassumethataandbhaveauthen- usefulinformationaboutthissessionkey. Mechanism5AsetofTTPsT1,...,TmassisttwousersAandBinestablishingasessionkeyKAB,andescrowthekeycollectively. 1.AsecretlychoosesandstoresitsprivatekeyagreementvalueSA,andcomputesthecorrespondingpublicvaluePA(=gSA),theprivatesharesSAi sequencevaasdenedinsubsection2.2,andthensendssaiandvatoti (1im). avericationsequencevb,andsendingsbiandvbtoti(1im)). (1im)ofSAasdenedinsubsection2.1,andthepublicverication 2.BfollowsthesameprocedureasA(choosingSB,creatingprivatesharesSBi, 3.Ti(1im)veriesSAi,PA,andSBi,PBasdescribedinsubsection 4.Ti(1im)doesthefollowing: otherwisetiacceptstheshare. 2.2.Ifthevericationfails,Tibroadcaststhesuspectsharevalueandstops; kttpscancomputekab(whichiswhatisrequiredforescrowpurposes). Theorem6Theabovemechanismhasthepropertythatanygroupofatleast 5.AandBseparatelycomputeasessionkeyas: calculatespat(=pstab sendspattobandpbttoa. obtainsstabbyusingthefunctionfwithk(t1;:::;tm),aandb, KAB=(PAT)SB=(PBT)SA=gSASBSTAB: A)andPBT(=PSTAB B),and theshamirschemediscussedinsubsection2.1above).hencetheycancompute Proof AnygroupofatleastkTTPscancomputeSAandSB(bythepropertiesof colluding,andnogroupoffewerthankthirdpartiescanobtainanyinformation partycanforceaorbtoacceptawrongmessageunlessallthethirdpartiesare aboutkab. andtheresultfollows. KABfrombeingescrowedbyusingahidden`shadow-key'.Inaddition,nothird ThemechanismhasbeendesignedtomakeitdicultforAandBtoprevent KAB=gSASBSTAB 2

10 meanthatkabalsochanges).thiscouldbeachievedbyincludingadate-stamp bydomainsotherthanthetwodomainsbeingserved,orbya`super-domain' inthefunctionfusedtocomputestab. includingthetwodomains,oroneorotherofthetwodomains. internationalsecuretelecommunications.thesetcouldconsistofttpslicensed atelytrustedbymutuallymistrustingdomains,dependsontherequirementsfor Themethodusedtocomposeasetofkeyescrowagencies,whoaremoder- lettingthetwouserschoosethekey(see[7]),lettingasetofttpsgeneratethe key(see[3]),andlettingoneuserandtwottpsgeneratethekey(see[8]),this jointlygeneratethekey,sothatitmaybemoredicultforusersandttpsto subvertthekey. mechanismforcesallinvolvedentities,i.e.bothusersandthesetofttps,to Comparedwithanumberofotherproposedkeyagreementschemes,suchas, ItwouldbedesirableifSTABcouldbechangedfromtimetotime(whichwill 2.Inthismechanism,AandBareusersindierentdomains.Therearem 3.3Mechanism2 [5]andthetransferableveriablesecretsharingschemedescribedinsection ThisescrowedkeyagreementschemeisbasedonDie-Hellmankeyexchange TTPsU1,...,UnworkingforBasauthenticationservers(inB'sdomain).These TTPsT1,...,TmworkingforAasauthenticationservers(inA'sdomain),andn serversalsooperateaskeyescrowagenciesfortheinterceptionagenciesintheir respectivedomains.eachsetofthirdpartiesismoderatelytrustedbytheirusers andinterceptionagencies.usersandinterceptionagenciesdonotcommunicate withttpsoutsidetheirdomain.ttpti(1im)cancommunicatewith Uj(1jn).Again,weassumethatAhasanauthenticatedchannelwith eachti,andbhasanauthenticatedchannelwitheachuj.eachgroupofttps fshalltakeasinputthesharedsecretkeysandthenamesofaandb,and agreeasecretkeyk(t1;:::;tm)ork(u1;:::;un)andafunctionf.thisfunction AandB(respectively)toestablishasessionkeyKAB.Eachsetofthirdparties escrowthekeycollectively. Mechanism7TwosetsofTTPsfT1,...,TmgandfU1,...,Ungassisttwousers aboutthissessionkey. andb,butnogroupofk?1orlessttpscanderiveanyusefulinformation orotherofthetwodomainscancomputethesessionkeyestablishedbetweena generateprivateintegersstabandsuabrespectively.theschemeisdesigned sothatforsomepositiveintegerk(kminfm;ng),anysetofkttpsfromone 1.AsecretlychoosesandstoresitsprivatekeyagreementvalueSA,andcomputesthefollowingvalues: thepublicvericationsequencevaasdenedinsubsection2.2,andthen thecorrespondingpublicvaluepa(=gsa), theprivatesharessai(1im)asdenedinsubsection2.1,and sendssaiandvatoti(1im).

11 2.Ti(1im)veriesSAiandPAasdescribedinsubsection2.2.IfthevericationfailsthenTibroadcaststhesuspectsharevalueandstops;otherwise Tiacceptstheshare. 3.BsecretlychoosesandstoresitsprivatekeyagreementvalueSB,andcomputesthefollowingvalues: Ujacceptstheshare. icationfailsthenujbroadcaststhesuspectsharevalueandstops;otherwise thecorrespondingpublicvaluepb(=gsb), theprivatesharessbj(1jn)asdenedinsubsection2.1,and thepublicvericationsequencevbasdenedinsubsection2.2,andthen calculatespat(=pstab obtainsstabbyusingthefunctionfwithk(t1;:::;tm),aandb, sendssbjandvbtouj(1jn). 5.Ti(1im)doesthefollowing: 4.Uj(1jn)veriesSBjandPBasdescribedinsubsection2.2.Ifthever- 6.Uj(1jn)veriesSAijSTAB,VAiandPATasdescribedinsubsection 2.3.IfthevericationfailsthenUjbroadcaststhesuspectsharevalueand calculatessaij(1jn)fromsaiasdenedinsubsection2.3, Finally,TisendsSAijSTAB,VAiandPATtoUj(1jn). computesthe`privateshares'saijstab,andtheircorrespondingpublic sequencevaiasdenedinsubsection2.2. valuesgsaijstabasdenedinsubsection2.4,andthepublicverication A), 7.Uj(1jn)doesthefollowing: stops,otherwiseujacceptstheshare. calculatespatu(=psuab obtainssuabbyusingthefunctionfwithk(u1;:::;un),aandb, 8.Ti(1im)veriesSBjiSUAB,VBjandPBUasdescribedinsubsection sendssbjisuab,vbjandpbutoti(1im). calculatespbu(=psuab calculatessbji(1im)fromsbjasdenedinsubsection2.3, computesthe`privateshares'sbjisuab,andtheircorrespondingpublic valuesgsbjisuabasdenedinsubsection2.4,andthepublicverication sequencevbjasdenedinsubsection2.2,and,nally, B), AT)andsendsittoB, kttps(ineitherdomain)cancomputekab. Theorem8Theabovemechanismhasthepropertythatanygroupofatleast 9.AandBcannowseparatelycomputethesessionkey: 2.3.IfthevericationfailsthenTibroadcaststhesuspectsharevalueand ittoa. stops,otherwisetiacceptstheshare,calculatespbtu(=pstab KAB=(PBTU)SA=(PATU)SB=gSASBSTABSUAB: BU)andsends Proof Theprooffollowsimmediatelyfromtheresultsinsubsection3.2above.2

12 thepreviousmechanism,itissuggestedthatstabandsuabshouldbechanged totrusteachother,asmentionedinsubsection2.3.forthesamereasonsasin asoftenasrequired. 4Furtherconsiderations Inakeyescrowsystem,thedieringrequirementsofusersandinterceptionauthoritiesarefurthercomplicatedbytheintroductionofthekeyescrowagencieciesforpreventingcriminalusersfromabusingescrowedkeys.Boththeusers andinterceptionagenciesshouldbeinapositiontocheckthatthekeyescrow theotherdomaincannotsubverttheescrowedkeys. relationshipsamongstthesethreegroupsofentitiesbecomesstillmorecompli- agenciescannotrevealescrowedkeysillegally.ininternationalkeyescrow,the domainhaveapotentialrequirementtocheckthatthekeyescrowagenciesin catedbecausemorethanonedomainisinvolved.thekeyescrowagenciesinone 4.1Moderatelytrustedthirdparties Therearetwomajorreasonswhywemakeuseofmoderatelytrustedthirdparties inthispaper. thevariousentitiesinvolved. Ifinterceptionagenciesarenotactivelyinvolvedinsessionkeyestablishment Inthissection,wediscussionsomeaspectsofthetrustrelationshipsbetween Inthismechanism,thetwosetsofthirdpartiesinbothdomainsdonothave (orttps).thekeyescrowagenciesareresponsibletotheinterceptionagen- Iftwouserssharingnosecretwanttocommunicatesecuritywitheachother, forpossiblydeviantusersanddonotstoreeverysessionkeythemselves,key ofthemmightbecollectivelytrustedbytheinterceptionagencies. escrowagenciesarerequiredtoprovideavalidkeywhenlawfullyauthorised. theyneedanauthenticationserviceprovidedbyauthenticationservers.althoughtheserversmaynotbetrustedindividually,agroupofthemmight Althoughthekeyescrowagenciesmaynotbetrustedindividually,agroup agenciesinpreviouslyproposedkeyescrowsystems.therstapproachinvolves [2,15])havebeenusedforsplittinganescrowedkeyintonsharesescrowedbyn `splitting'withannoutofnscheme,whereallncomponentsareneededto restoreagivenkey[12].thesecondapproachusessplittingwithankoutofn thresholdscheme,whichallowsanysubsetofkofthenescrowagenciestoaect Fourkindsofkeysplittingschemesbasedonsecretsharingschemes(e.g. therecoveryofacompletekey,butprohibitsanygroupoffewerthankagencies becollectivelytrustedbytheirusers. (n;t;u)-escrowscheme,whichallowsasubsetoftheescrowagenciestorecover fromrecoveringacompletekey[9].thethirdapproachinvolvessplittingwithan akey,wheretescrowagenciescouldconspirewithoutcompromisingakey,and n?uagenciescould`withhold'theircomponentswithoutinterferingwithkey

13 recovery(t<un)[11].thelastapproachinvolvessplittingwitha`general ofescrowagenciesthatcanworktogethertorestoreakey[4]. tually,anyoneofthesefoursplittingschemescouldhavebeenchosen,andin moderatelytrustedthirdparties.notealsothattheideaofreiteretal.regardingsecuregroupimplementationin[14]canbeusedtoestablishsuchasetof monotoneaccessstructure',whichallowsforthespecicationofarbitrarysubsets 4.2Untrustworthyusers practicethechoicewoulddependontherequirementsforestablishingasetof moderatelytrustedthirdpartiesandtheirgroupkey. Wehaveusedthesecondapproachinthemechanismsdescribedhere.Ac- S0)isa`shadow'keypair,andP0=f(P)wherefisaneasilycomputedand (P,S)and(P0,S0),where(P,S)isaproper(public-key,private-key)pair,(P0, agreement.inthisattack,eachoftwoattackersinsteadgeneratestwokeypairs interceptionauthoritycancomputeanescrowedkeybyusingdie-hellmankey interceptionauthoritytheabilitytoreconstructs,sothatboththeusersand exchange.eachnormalusergeneratesapair(p,s),publishespandgivesan howthisattackmightworkinakeyescrowsystembasedondie-hellmankey KilianandLeightongavea`shadow-public-key'attackin[9],andwenowsee Wenowconsiderthecasewhereusersarenottrustworthyinakeyescrowsystem. separatelycomputea`shadow-escrowed-key'byusinghis`shadow-private-key' ordinaryuser,butkeepss0reservedashisshadowprivatekey.bothattackers publiclyknownfunction.eachofthemuses(p,s)inthesamewayaswouldan andtheother's`shadow-public-key'.ifitisinfeasibletoobtains0byknowingp, P0andS,theinterceptionauthoritycannotobtainthe`shadow-escrowed-key'. tion2.4,whichprovidedthebasisofusersandthirdpartiesjointlygenerating Furthermoretheinterceptionauthoritymaynotdetectthischeating. anescrowedkeyinordertopreventtheusersfromusingahidden`shadow-key'. whichisinfeasiblycomputedbyusingp,p0ands. NotethatitonlymakessensetopreventcriminalusersfromobtainingaS0 ingthekeyescrowsystembyusingimproperkeys,forexamples,usinganold escrowedkeyinsteadofacurrentone,usingamodicationoftheescrowedkey, e.g.whichmaybeapubliclyknownfunctionoftherealescrowedkey,andusing Wepresentedananeexpansibleveriablesecretsharingschemeinsubsec- ands.althoughtheseabusesarealldetectable,akeyescrowmechanismmay a`shadow-public-key',wheres0mayfeasiblybecomputedbyknowingp,p0 nevercheckforsuchabuses,givingdeviantusersgreaterleewayintheirabuses. as,keepingalloldescrowedkeysinavalidperiodtocheckiftheyareused Thefurtherproblemishowinpracticetopreventcriminalusersfromabus- again,andmonitoringallcommunicationchannelsbetweensuspectedcriminal users[10].unfortunately,theseapproachesmaynotbepractical,particularly,in thecurrentescrowkeyiftheusersshareasecretorcanusetheirownsecurity complicatedmobiletelecommunicationssystems. Anumberofapproachescouldbeusedtopreventtheaboveabuses,such Infact,itisimpossibleforakeyescrowsystemtoforcetwouserstouseonly

14 agenciesinordertoauthenticateoneanother'sidentityandestablishashared byusinganoldescrowedkeyoramodiedescrowedkey.howeverwehavenot communicatesecurelywitheachother,havetogetassistancefromkeyescrow answeredthequestionofhowtoforceuserstouseonlythecurrentescrowed sessionkey.weassumeitisdetectableiftheuserssubvertkeyescrowsystems system.forthepurposesofthispaper,wesupposethattwousers,whowantto 4.3Multiplemistrustingdomains withtwomobilecompaniesbelongtocountriesgandh,andareroamingin Sofarwehavediscussedkeyescrowinmutuallymistrustingdomains.However, arecitizensofcountriescandd,workforcountrieseandf,areregistered twocountriesiandj.theirtracmightconceivablyneedtobeintercepted somemodernsecurecommunicationsmaycovermorethantwodomains.for example,inaglobalmobiletelecommunicationssystem,twousers,respectively, anddeviseaninternationalkeyescrowsystemwhichprovidesallgovernments byagenciesinanyofcountriesc?j,andhenceitmaybenecessarytotry involvedwithwarrantedaccesstousercommunications.tomakemattersmore complicated,thecountriesinvolvedmaynotalltrusteachother. large. maynotbepractical,particularlywhenthenumberofdomainsinvolvedisquite involvedhavetocollaboratetoprovidecontributionstotheescrowedkey.this asdescribedinsubsection3.3,couldalsobeusedforthispurpose,atleastin theory.theproblemisthateachsetofkeyescrowagenciesineachdomain purpose.however,whetherornotasetofkeyescrowagenciescouldbeset upwhicharemoderatelytrustedbymultiplemistrustingdomains,dependson politicalconsiderationsbeyondthescopeofthispaper.thesecondmechanism, Ourrstmechanism,asdescribedinsubsection3.2,couldbeusedforthis inmutuallymistrustingdomainsandanalyseditsuse. 5Conclusions Wehavedescribedakeyescrowsystemusingmoderatelytrustedthirdparties Dothereexistpracticalkeyescrowsystemsforcinguserstouseonlythe Thefollowingopenquestionsareofpotentialpracticalimportance. References 1.NationalInstituteofStandardsandTechnology.FIPSPublication185:Escrowed Canapracticalkeyescrowschemebedesignedforthecasewheremorethan spanmorethanonedomain? currentescrowedsessionkey? EncryptionStandard.February1994. twodomainsareinvolved,andwhereescrowagenciesarenotpermittedto

15 2.G.R.Blakley.Safeguardingcryptographickeys.IntheProceedingsofAFIPS L.Chen,D.Gollmann,andC.Mitchell.Keydistributionwithoutindividual NCC,Vol.48,Arlington,Va.,pages313{317,June Y.FrankelandM.Yung.Escrowencryptionsystemsvisited:attacks,analysis 5.W.DieandM.E.Hellman.Newdirectionsincryptography.IEEETransactions 4.D.E.DenningandD.K.Branstad.Ataxonomyforkeyescrowencryptionsystems. oninformationtheory,22:644{654,november1976. anddesigns.ind.coppersmith,editor,lecturenotesincomputerscience963, CommunicationsoftheACM,39(3):34{40,1996. trustedauthenticationservers.inproceedings:the8thieeecomputersecurity AdvancesinCryptology CRYPTO'95,pages222{235.Springer{Verlag,1995. California,June1995. FoundationsWorkshop,pages30{36.IEEEComputerSocietyPress,LosAlamitos, 7.L.Gong.Increasingavailabilityandsecurityofanauthenticationservice.IEEE 10.A.K.Lenstra,P.Winkler,andY.Yacobi.Akeyescrowsystemwithwarrant 8.N.Jeeries,C.Mitchell,andM.Walker.Aproposedarchitecturefortrusted thirdpartyservices.ine.dawsonandj.golic,editors,lecturenotesincomputerscience1029,cryptography:policyandalgorithmsconference,pages98{104. Springer-Verlag,1996. editor,lecturenotesincomputerscience963,advancesincryptology-crypto JournalonSelectedAreasinCommunications,11:657{662, S.MicaliandR.Sidney.Asimplemethodforgeneratingandsharingpseudorandomfunctions,withapplicationstoclipper-likekeyescrowsystems.InD. Software,toappearOctober1996. Coppersmith,editor,LectureNotesinComputerScience963,AdvancesinCryp- 9.J.KilianandT.Leighton.Faircryptosystems,revisited.InD.Coppersmith, 12.J.Nechvatal.Apublic-keybasedkeyescrowsystem.JournalofSystemsand '95,pages208{221.Springer{Verlag, T.P.Pedersen.Distributedproverswithapplicationstoundeniablesignatures. bounds.ind.coppersmith,editor,lecturenotesincomputerscience963,advancesincryptology-crypto'95,pages197{207.springer{verlag, M.K.Reiter,K.P.Birman,andR.vanRenesse.Asecurityarchitectureforfaulttolerantsystems.ACMTransactionsonComputerSystems,12:340{371, A.Shamir.Howtoshareasecret.CommunicationsoftheACM,22:612{613,1979. tology-crypto'95,pages185{196.springer{verlag,1995. InD.W.Davies,editor,LectureNotesinComputerScience547,Advancesin Cryptology:Proc.Eurocrypt'91,pages221{238.Berlin:Springer-Verlag,1991. ThisarticlewasprocessedusingtheLATEXmacropackagewithLLNCSstyle

timeout StoR!msg0 RtoS?ack0

timeout StoR!msg0 RtoS?ack0 c1997kluweracademicpublishers,boston.manufacturedinthenetherlands. FormalMethodsinSystemDesign,,?{??(1997) SymbolicVericationofCommunication ProtocolswithInniteStateSpacesusingQDDs queues.itiswell-knownthatmostinterestingvericationproblems,suchasdeadlockdetection,

More information

PSR J0007+7303 -10. Full Band Fit (PLEC1) Energy Band Fits. dn/de (erg cm -11. Energy (GeV)

PSR J0007+7303 -10. Full Band Fit (PLEC1) Energy Band Fits. dn/de (erg cm -11. Energy (GeV) PSR J0007+7303 - Full Band Fit (PLC1 nergy Band Fits - s 1 1 PSR J003+093 Full Band Fit (PLC1 nergy Band Fits - s 1 PSR J0030+0451 Full Band Fit (PLC1 - s 1 nergy Band Fits 1 1 PSR J0034-0534 Full Band

More information

Bypassing NoScript Security Suite Using Cross-Site Scripting and MITM Attacks

Bypassing NoScript Security Suite Using Cross-Site Scripting and MITM Attacks Bypassing NoScript Security Suite March 2016 Mazin Ahmed [email protected] @mazen160 Table of Contents Abstract... 3 Introduction... 3 Research... 4 Solution... 7 Recommendations... 7 Notes... 7 Disclosure

More information

Website Development Plans

Website Development Plans Website Development Plans March 23 2014 SITE Expertise M-27, Jia Sarai, Near IIT Delhi, Hauz Khas, New Delhi-110016 Contact:- 01166575782, Email :- [email protected], Website :- http://siteexpertise.in

More information

Performance Modeling in Industry A Case Study on Storage Virtualization

Performance Modeling in Industry A Case Study on Storage Virtualization Performance Modeling in Industry A Case Study on Storage Virtualization SOFTWARE DESIGN AND QUALITY GROUP - DESCARTES RESEARCH GROUP INSTITUTE FOR PROGRAM STRUCTURES AND DATA ORGANIZATION, FACULTY OF INFORMATICS

More information

Dear Customer, Many thanks Domain Administration Team

Dear Customer, Many thanks Domain Administration Team Dear Customer, Thank you for your purchase of a.ie domain name. In order for this domain to become fully registered, there are certain requirements which must first be met. If the domain is not registered

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Chapter 11. Topics Covered. Chapter 11 Objectives. Risk, Return, and Capital Budgeting

Chapter 11. Topics Covered. Chapter 11 Objectives. Risk, Return, and Capital Budgeting Chapter 11 Risk, Return, and Capital Budgeting Topics Covered Measuring Market Risk Portfolio Betas Risk and Return CAPM and Expected Return Security Market Line CAPM and Stock Valuation Chapter 11 Objectives

More information

Building Customer Confidence through SSL Certificates and SuperCerts

Building Customer Confidence through SSL Certificates and SuperCerts Building Customer Confidence through SSL Certificates and SuperCerts Contents 1. Overview 2. Why SSL? 3. Who needs an SSL certificate? 4. How to tell if a website is secure 5. Browser warnings 6. What

More information

Formal Methods in Security Protocols Analysis

Formal Methods in Security Protocols Analysis Formal Methods in Security Protocols Analysis Li Zhiwei Aidong Lu Weichao Wang Department of Computer Science Department of Software and Information Systems University of North Carolina at Charlotte Big

More information

What is an SSL Certificate?

What is an SSL Certificate? Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert

More information

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA [email protected] ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has

More information

AmyP.Felty1,DouglasJ.Howe1,andFrankA.Stomp2 ProtocolVericationinNuprl? 2Dept.ofComp.Sci.,UCDavis,Davis,CA95616,[email protected] 1BellLabs,MurrayHill,NJ07974,USA.ffelty,[email protected] whileretainingexistingadvantagesofthesystem,anddescribesapplicationoftheprovertoverifyingthescicachecoherenceprotocol.the

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most

More information

Algebra I. In this technological age, mathematics is more important than ever. When students

Algebra I. In this technological age, mathematics is more important than ever. When students In this technological age, mathematics is more important than ever. When students leave school, they are more and more likely to use mathematics in their work and everyday lives operating computer equipment,

More information

State of South Carolina Information Technology Classification Revisions FOR THE STATE OF SOUTH CAROLINA INTERNAL USE ONLY

State of South Carolina Information Technology Classification Revisions FOR THE STATE OF SOUTH CAROLINA INTERNAL USE ONLY State of South Carolina Information Technology Classification Revisions Reasons for the Changes Modernization Address changes to IT occupations InfoSec and Privacy Professional Development Program Proposed

More information

17. SIMPLE LINEAR REGRESSION II

17. SIMPLE LINEAR REGRESSION II 17. SIMPLE LINEAR REGRESSION II The Model In linear regression analysis, we assume that the relationship between X and Y is linear. This does not mean, however, that Y can be perfectly predicted from X.

More information

How To Validate Synchronous Reactivesystems

How To Validate Synchronous Reactivesystems fromformalvericationtoautomatictesting? ValidationofSynchronousReactiveSystems: fnicolas.halbwachs,[email protected] NicolasHalbwachs,PascalRaymond thevalidationofreactivesystemsdescribedinthesynchronousdata-ow

More information

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT Guidelines for candidates who are taking the ICT Infrastructure Examination This qualification is based on ITIL Infrastructure Management as

More information

NETWORKS AND THE INTERNET

NETWORKS AND THE INTERNET NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place

More information

3C05: Unified Software Development Process

3C05: Unified Software Development Process 3C05: Unified Software Development Process 1 Unit 5: Unified Software Development Process Objectives: Introduce the main concepts of iterative and incremental development Discuss the main USDP phases 2

More information

If n is odd, then 3n + 7 is even.

If n is odd, then 3n + 7 is even. Proof: Proof: We suppose... that 3n + 7 is even. that 3n + 7 is even. Since n is odd, there exists an integer k so that n = 2k + 1. that 3n + 7 is even. Since n is odd, there exists an integer k so that

More information

Collatz Sequence. Fibbonacci Sequence. n is even; Recurrence Relation: a n+1 = a n + a n 1.

Collatz Sequence. Fibbonacci Sequence. n is even; Recurrence Relation: a n+1 = a n + a n 1. Fibonacci Roulette In this game you will be constructing a recurrence relation, that is, a sequence of numbers where you find the next number by looking at the previous numbers in the sequence. Your job

More information

COMMUTATIVE RINGS. Definition: A domain is a commutative ring R that satisfies the cancellation law for multiplication:

COMMUTATIVE RINGS. Definition: A domain is a commutative ring R that satisfies the cancellation law for multiplication: COMMUTATIVE RINGS Definition: A commutative ring R is a set with two operations, addition and multiplication, such that: (i) R is an abelian group under addition; (ii) ab = ba for all a, b R (commutative

More information

Indiana State Core Curriculum Standards updated 2009 Algebra I

Indiana State Core Curriculum Standards updated 2009 Algebra I Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and

More information

Welcome to HomeTown Bank s Secure E-mail! User Guide

Welcome to HomeTown Bank s Secure E-mail! User Guide Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the

More information

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems LTE Security Encryption and Integrity Protection in LTE 2012 Inc. 1 LTE Security: ey Concepts Authentication The LTE Network verifies the UE s identity by challenging the UT use the keys and report a result.

More information

The Software Process. Software Process Activities. Functional Specification

The Software Process. Software Process Activities. Functional Specification The Software Process Step and procedures executed by a software organization during the development of software Not a linear sequence of steps Many activities occur simultaneously or in random order Organizations

More information

Algebra 2 Notes AII.7 Functions: Review, Domain/Range. Function: Domain: Range:

Algebra 2 Notes AII.7 Functions: Review, Domain/Range. Function: Domain: Range: Name: Date: Block: Functions: Review What is a.? Relation: Function: Domain: Range: Draw a graph of a : a) relation that is a function b) relation that is NOT a function Function Notation f(x): Names the

More information

Information Systems and Services (ISS) Post Reference No: 9B0932 Effective/Revised: September 2009

Information Systems and Services (ISS) Post Reference No: 9B0932 Effective/Revised: September 2009 London Met Dept: London Met Sect: London Met Unit: Job Title: Information Systems and Services (ISS) Service Development Solutions Architect (Media) Post Reference No: 9B0932 Effective/Revised: September

More information

Checkpoint firewall Quick Integration Guide. for PacketFence version 4.6.0

Checkpoint firewall Quick Integration Guide. for PacketFence version 4.6.0 Checkpoint firewall Quick Integration Guide for PacketFence version 4.6.0 Checkpoint firewall Quick Integration Guide by Inverse Inc. Version 4.6.0 - Nov 2014 Copyright 2015 Inverse inc. Permission is

More information

= C + I + G + NX ECON 302. Lecture 4: Aggregate Expenditures/Keynesian Model: Equilibrium in the Goods Market/Loanable Funds Market

= C + I + G + NX ECON 302. Lecture 4: Aggregate Expenditures/Keynesian Model: Equilibrium in the Goods Market/Loanable Funds Market Intermediate Macroeconomics Lecture 4: Introduction to the Goods Market Review of the Aggregate Expenditures model and the Keynesian Cross ECON 302 Professor Yamin Ahmad Components of Aggregate Demand

More information

MAT12X Intermediate Algebra

MAT12X Intermediate Algebra MAT12X Intermediate Algebra Workshop I - Exponential Functions LEARNING CENTER Overview Workshop I Exponential Functions of the form y = ab x Properties of the increasing and decreasing exponential functions

More information

Georgia Department of Education Common Core Georgia Performance Standards Framework Teacher Edition Coordinate Algebra Unit 4

Georgia Department of Education Common Core Georgia Performance Standards Framework Teacher Edition Coordinate Algebra Unit 4 Equal Salaries for Equal Work? Mathematical Goals Represent data on a scatter plot Describe how two variables are related Informally assess the fit of a function by plotting and analyzing residuals Fit

More information

Somansa Data Security and Regulatory Compliance for Healthcare

Somansa Data Security and Regulatory Compliance for Healthcare Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,

More information

These are some practice questions for CHAPTER 23. Each question should have a single answer. But be careful. There may be errors in the answer key!

These are some practice questions for CHAPTER 23. Each question should have a single answer. But be careful. There may be errors in the answer key! These are some practice questions for CHAPTER 23. Each question should have a single answer. But be careful. There may be errors in the answer key! 67. Public saving is equal to a. net tax revenues minus

More information

Cloud Services. Lync. IM/ Web Conferencing Admin Quick Start Guide

Cloud Services. Lync. IM/ Web Conferencing Admin Quick Start Guide Cloud Services Lync IM/ Web Conferencing Admin Quick Start Guide 10/14/2014 ACTIVATION LETTER An activation letter will be sent to the email account of your administrator contact. Please look for the following

More information

TechnischeUniversitatChemnitz-Zwickau

TechnischeUniversitatChemnitz-Zwickau TechnischeUniversitatChemnitz-Zwickau DFG-Forschergruppe\SPC"FakultatfurMathematik DomainDecompositionand PreconditioningOperators MultilevelTechniquesfor SergejV.Nepomnyaschikh SiberianBranchofRussianAcademyofSciences

More information

Appendix C-8 IOC / FOC Target Timeline. Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN)

Appendix C-8 IOC / FOC Target Timeline. Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN) Appendix C-8 IOC / FOC Target Timeline Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN) 04/27/2015 Table of Contents 1 Document Overview... 1 2 High Level IOC Timeline... 1

More information

Amply Fws Modules (Aflk n, Sonlu Zay f Eklenmifl Modüller)

Amply Fws Modules (Aflk n, Sonlu Zay f Eklenmifl Modüller) Çankaya Üniversitesi Fen-Edebiyat Fakültesi, Journal of Arts and Sciences Say : 4 / Aral k 2005 Amply Fws Modules (Aflk n, Sonlu Zay f Eklenmifl Modüller) Gökhan B LHA * Abstract In this work amply finitely

More information

Chapter 11. Topics Covered. Chapter 11 Objectives. Risk, Return, and Capital Budgeting

Chapter 11. Topics Covered. Chapter 11 Objectives. Risk, Return, and Capital Budgeting Chapter 11 Risk, Return, and Capital Budgeting Topics Covered Measuring Market Risk Portfolio Betas Risk and Return CAPM and Expected Return Security Market Line CAPM and Stock Valuation Chapter 11 Objectives

More information

Outline. Outline. Outline

Outline. Outline. Outline Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather

More information

MAT 135 Midterm Review Dugopolski Sections 2.2,2.3,2.5,2.6,3.3,3.5,4.1,4.2,5.7,5.8,6.1,6.2,6.3

MAT 135 Midterm Review Dugopolski Sections 2.2,2.3,2.5,2.6,3.3,3.5,4.1,4.2,5.7,5.8,6.1,6.2,6.3 Directions: Complete each problem and select the correct answer. NOTE: Not all topics on the midterm are represented in this review. For a complete set of review problems, please do the book-based midterm

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

Session Border Controller and IP Multimedia Standards. Mika Lehtinen [email protected]

Session Border Controller and IP Multimedia Standards. Mika Lehtinen mika.lehtinen@teliasonera.com Session Border Controller and IP Multimedia Standards Mika Lehtinen [email protected] December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December

More information

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone)

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that

More information

CLOSED AND EXACT DIFFERENTIAL FORMS IN R n

CLOSED AND EXACT DIFFERENTIAL FORMS IN R n CLOSED AND EXACT DIFFERENTIAL FORMS IN R n PATRICIA R. CIRILO, JOSÉ REGIS A.V. FILHO, SHARON M. LUTZ [email protected], [email protected], [email protected] Abstract. We show in this paper that

More information

SHARING BETWEEN TERRESTRIAL FLIGHT TELEPHONE SYSTEM (TFTS) AND RADIO ASTRONOMY IN THE 1.6 GHz BAND. Paris, May 1992

SHARING BETWEEN TERRESTRIAL FLIGHT TELEPHONE SYSTEM (TFTS) AND RADIO ASTRONOMY IN THE 1.6 GHz BAND. Paris, May 1992 European Radiocommunications Committee (ERC) within the European Conference of Postal and Telecommunications Administrations (CEPT) SHARING BETWEEN TERRESTRIAL FLIGHT TELEPHONE SYSTEM (TFTS) AND RADIO

More information

MobileIron Quick Integration Guide. for PacketFence version 4.5.1

MobileIron Quick Integration Guide. for PacketFence version 4.5.1 MobileIron Quick Integration Guide for PacketFence version 4.5.1 MobileIron Quick Integration Guide by Inverse Inc. Version 4.5.1 - Nov 2014 Copyright 2014 Inverse inc. Permission is granted to copy, distribute

More information

Binary Search Trees CMPSC 122

Binary Search Trees CMPSC 122 Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information

1.6 A LIBRARY OF PARENT FUNCTIONS. Copyright Cengage Learning. All rights reserved.

1.6 A LIBRARY OF PARENT FUNCTIONS. Copyright Cengage Learning. All rights reserved. 1.6 A LIBRARY OF PARENT FUNCTIONS Copyright Cengage Learning. All rights reserved. What You Should Learn Identify and graph linear and squaring functions. Identify and graph cubic, square root, and reciprocal

More information

Some remarks on Phragmén-Lindelöf theorems for weak solutions of the stationary Schrödinger operator

Some remarks on Phragmén-Lindelöf theorems for weak solutions of the stationary Schrödinger operator Wan Boundary Value Problems (2015) 2015:239 DOI 10.1186/s13661-015-0508-0 R E S E A R C H Open Access Some remarks on Phragmén-Lindelöf theorems for weak solutions of the stationary Schrödinger operator

More information

12.5 Equations of Lines and Planes

12.5 Equations of Lines and Planes Instructor: Longfei Li Math 43 Lecture Notes.5 Equations of Lines and Planes What do we need to determine a line? D: a point on the line: P 0 (x 0, y 0 ) direction (slope): k 3D: a point on the line: P

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]

More information

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium 2012-01-18, Miami Beach FL / USA Dr. Stephan Beirer [email protected] Sichere ebusiness

More information

An Architecture Concept for Mobile P2P File Sharing Services

An Architecture Concept for Mobile P2P File Sharing Services 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" An Architecture Concept for Mobile P2P File Sharing Services Andersen F.-U., Kappler C. (Siemens AG) Ivan Dedinski, Oberender

More information

Interim Assessment Statement of Purpose

Interim Assessment Statement of Purpose Statement of Purpose Statement of Purpose for the Smarter Balanced Interim Assessment The Smarter Balanced Assessment System has three major components: end-of-year summative assessments designed for accountability

More information

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff

More information

ASSOCIATE DEGREE NURSING PROGRAM. Mission

ASSOCIATE DEGREE NURSING PROGRAM. Mission ASSOCIATE DEGREE NURSING PROGRAM Mission The Associate Degree Nursing program supports the mission of the North Carolina Community College System and the mission of Fayetteville Technical Community College.

More information

Lecture 3 : The Natural Exponential Function: f(x) = exp(x) = e x. y = exp(x) if and only if x = ln(y)

Lecture 3 : The Natural Exponential Function: f(x) = exp(x) = e x. y = exp(x) if and only if x = ln(y) Lecture 3 : The Natural Exponential Function: f(x) = exp(x) = Last day, we saw that the function f(x) = ln x is one-to-one, with domain (, ) and range (, ). We can conclude that f(x) has an inverse function

More information

FINAL EXAM SECTIONS AND OBJECTIVES FOR COLLEGE ALGEBRA

FINAL EXAM SECTIONS AND OBJECTIVES FOR COLLEGE ALGEBRA FINAL EXAM SECTIONS AND OBJECTIVES FOR COLLEGE ALGEBRA 1.1 Solve linear equations and equations that lead to linear equations. a) Solve the equation: 1 (x + 5) 4 = 1 (2x 1) 2 3 b) Solve the equation: 3x

More information

High School Functions Interpreting Functions Understand the concept of a function and use function notation.

High School Functions Interpreting Functions Understand the concept of a function and use function notation. Performance Assessment Task Printing Tickets Grade 9 The task challenges a student to demonstrate understanding of the concepts representing and analyzing mathematical situations and structures using algebra.

More information

On Data Recovery in Distributed Databases

On Data Recovery in Distributed Databases On Data Recovery in Distributed Databases Sergei L. Bezrukov 1,UweLeck 1, and Victor P. Piotrowski 2 1 Dept. of Mathematics and Computer Science, University of Wisconsin-Superior {sbezruko,uleck}@uwsuper.edu

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Maximizing volume given a surface area constraint

Maximizing volume given a surface area constraint Maximizing volume given a surface area constraint Math 8 Department of Mathematics Dartmouth College Maximizing volume given a surface area constraint p.1/9 Maximizing wih a constraint We wish to solve

More information

Lecture 4: Properties of stock options

Lecture 4: Properties of stock options Lecture 4: Properties of stock options Reading: J.C.Hull, Chapter 9 An European call option is an agreement between two parties giving the holder the right to buy a certain asset (e.g. one stock unit)

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

TCIL/16/12/07/2015(WI) 22 nd July 2015. NIT for Pre-bid Tie-up for Disaster Management EoI

TCIL/16/12/07/2015(WI) 22 nd July 2015. NIT for Pre-bid Tie-up for Disaster Management EoI TCIL/16/12/07/2015(WI) 22 nd July 2015 NIT for Pre-bid Tie-up for Disaster Management EoI Telecommunications Consultants India Ltd., (TCIL), is a Government of India Enterprise under Ministry of Communications,

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

Investigation of Chebyshev Polynomials

Investigation of Chebyshev Polynomials Investigation of Chebyshev Polynomials Leon Loo April 25, 2002 1 Introduction Prior to taking part in this Mathematics Research Project, I have been responding to the Problems of the Week in the Math Forum

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

Warm Up. Write an equation given the slope and y-intercept. Write an equation of the line shown.

Warm Up. Write an equation given the slope and y-intercept. Write an equation of the line shown. Warm Up Write an equation given the slope and y-intercept Write an equation of the line shown. EXAMPLE 1 Write an equation given the slope and y-intercept From the graph, you can see that the slope is

More information

ASSUMPTION LIFE PARPLUS. Participating Whole Life Insurance

ASSUMPTION LIFE PARPLUS. Participating Whole Life Insurance ASSUMPTION LIFE PARPLUS Participating Whole Life Insurance Features Issue ages Premium payment period Minimum sum insured Maximum sum insured Banding Annual fees Guaranteed cash values Riders Dividend

More information

Rules for Unibz It And eurac.edu

Rules for Unibz It And eurac.edu Index 1 Access...2 2 Applications...2 3 Responsibility...2 4 Personal details...2 5 Commercial Activities...2 6 Rules of use... 3 7 System security... 3 8 Safety... 3 9 Software Use... 4 9.1 Legal aspects...

More information

How To Choose A Business Continuity Solution

How To Choose A Business Continuity Solution A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government

More information

Differentiating under an integral sign

Differentiating under an integral sign CALIFORNIA INSTITUTE OF TECHNOLOGY Ma 2b KC Border Introduction to Probability and Statistics February 213 Differentiating under an integral sign In the derivation of Maximum Likelihood Estimators, or

More information