Orwell. From Bitcoin to secure Domain Name System
|
|
|
- Matilda Rich
- 9 years ago
- Views:
Transcription
1 Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, Poznań, Poland {Michal.Jabczynski, Abstract This paper addresses the problem of distributed trust ureliability and trusted third party dependency in a decentralized network. We demonstrate that trust can be created and maintained in a decentralized way, without relying on certificate authorities but instead using the Nash equilibrium, based on individual profit, made possible by the development of cryptocurrencies. We show how Write-Once Storage can be used as the basis of a secure naming system. Finally, we present Orwell a secure decentralized domain name system based on the blockchain protocol. 1. Introduction Over the last 20 years, the Internet changed significantly it became much more decentralized, and so did the services it provides. The concept of trust also evolved it has seemingly become a resource that can be bought, sold and stolen. What did not change about trust is its centralized nature. Virtually all trust establishing systems delegate all critical decisions to trusted third parties. It would be wrong to assume that all certification authorities adhere to the same standards and provide the same level of identity assurance. In fact, many certificate authorities issue certificates without any legal or technical processes to authenticate the identity of the entity requesting the certificate, relying only on the Domain Name Registrar details to validate identity ownership. The purpose of this paper is to address the issue of trusted third party dependency in the public key infrastructure. We will demonstrate that trust can be created and maintained in a decentralized way, without relying on certificate authorities but instead using the Nash equilibrium (Nash, 1950) based on individual profit, made possible by the development of cryptocurrencies. We will show how Write-Once Storage can be used as the basis of a secure naming system. We will also present Orwell a secure decentralized domain name system based on the Blockchain protocol, introduced by Bitcoin (Nakamoto, 2009). 2. Related work The trusted third party (TTP) is often misused as a building block of secure systems. Instead of being treated as a weak link in the chain, it is used as a black box that encapsulates existing problems and hides them based on the assumption of infallibility and reliability. The TTP is a costly and risky element that should be thoroughly thought through before use, and can be used either as a last resort, or an unavoidable risk. The reason for it is that introducing a TTP to the system is equivalent to introducing a potential security hole (Szabo, 2001), as it is an a priori weakness and an additional point of attack Write Once Storage One of the most useful abstractions over a trust system is a Write Once Storage. Let us consider a basic key-value storage system with the following properties: public access property any party may attempt reading or writing any key, read fail property if no value was written for the given key, a read operation will fail explicitly, read agreement property if the read operation succeeds, no other successful read will ever return a different value. This storage could serve as a basis for a distributed trust system. An identity registration could be executed by attempting a write operation the key would be equal to a user name, and the value would be the owner s public key. After the write, the node would periodically try to read a value until the read succeeds. If the returned value is equal to the public key, the registration succeeded and no other node will ever observe a different value. If the returned value is different, the registration failed and will never succeed in the future. Using custom keys in a Write Once Storage requires agreement between nodes. The agreement can take many forms it can be enforced by a trusted third party. Notice that the Public Key Infrastructure can be easily abstracted away into a Write Once Storage, where the read agreement property is a result of organizing certificate authorities into a tree structure. Provided that the certificate authorities always agreed on who should be associated with the particular domain (which is one of the main false assumptions of a PKI), the system could be considered a secure trust system Bitcoin Bitcoin (Nakamoto, 2009) is the first successful example of a cryptocurrency. The significance of Bitcoin lies in the fact that it is a decentralized peer-to-peer (P2P) system, with no trusted third parties involved. There is no governing body that manages the distribution of currency, its exchange rate or any other parameter. Users participating in the network deploy nodes that collectively verify all transactions happening in real time. The fundamental concept behind Bitcoin is the Blockchain a distributed ledger that tracks the state of all accounts in the system. The 423
2 Blockchain establishes total order of all transactions with no central coordination, through voting with CPU power Wallets Bitcoin are stored in wallets accounts in the Bitcoin network. Each wallet consists of an asymmetric key pair, where the public key serves as the account number and identifier, and private key allows the owner to spend coins stored in the wallet. This means that every user can generate an arbitrary number of accounts, without any central authority. Because coins are assigned to wallets, not nodes, anybody can receive funds without any direct communication. 3. Orwell Orwell is a heavily modified blockchain protocol, based on the basic idea of Bitcoin. It provides its users with tools for generating wallets, and sending currency between accounts. The fundamental difference between Orwell and Bitcoin is purpose. Orwell uses the concept of a cryptocurrency as the means of establishing and sustaining a decentralized write-once storage that can be used as a functional replacement for the DNS system. Orwell focuses on solving the problems of Namecoin and optimizing the performance of name resolution. The goals of the system are the following: Transactions The coin transfer between accounts is called a transaction. It is a structure that contains the outputs (records containing which account receives a certain amount of coins), the inputs (identifiers of the outputs from previous transactions that this transaction spends), and signatures that verify the transaction as coming from an authorized person. The transaction is considered valid if the inputs it tries to spend are not yet spent, and if the signatures it contains are valid. The transaction is created by the node belonging to the owner of the wallet, and it is broadcasted across the Bitcoin network. However, the act of announcing the transaction is not equivalent with the definite proof that the transaction actually took place. In order for the transaction to be accepted into the network, it has to be included in the Blockchain Mining The process of creating blocks is called mining. It is a computationally expensive process that involves hashing the block contents in order to produce a hash that fits within a defined integer range. Producing blocks is a profitable exercise each block yields a defined amount of coins that is granted to the person that managed to find the correct hash for the next block. It is easy to notice that it is perfectly possible for nodes in the network to produce two blocks simultaneously. However, only one of these blocks will ever be accepted Namecoin The model of Bitcoin involves a peer-to-peer system where participants are continuously validating a series of transactions without any central control. That model was directly applied to the domain name system by modifying the Bitcoin protocol and the result was called Namecoin (NMC). Namecoin aims at providing a secure naming system that is partially compatible with DNS (provides a compatible naming scheme). All information about all domains is stored inside the Blockchain, including keys, values and subdomain structure. Despite the initial popularity, Namecoin has suffered from several limitations and numerous bugs (Gronager, 2013) leading it to become an abandoned project. 424 to provide a fully functional replacement for the DNS system, with ownership transfer, caching, arbitrary record types and values, to operate and sustain a truly decentralized DNS system, without trusted third parties, to solve the problem of registration race, making it possible for a domain name to be announced after the registration itself, without the necessity of disclosing it to external parties, to create a query-response name resolution protocol that provides provable name resolution without the necessity to know the whole chain (making it possible for thin clients to use and resolve Orwell domain names), to make the system resistant to man-in-the-middle attacks Design overview An efficient design of a decentralized, cryptographically secure DNS-like system must address two technical challenges: enforcing strict mapping between names and public keys, which requires an unambiguous domain registration order, and at the same time allowing for elastic, eventually consistent updates once the domain ownership is guaranteed. To make it possible, Orwell is composed of two separate protocols. By splitting the design into two subsystems, nodes can specialize and serve only one function, greatly enhancing performance and reducing he requirements imposed on clients. The protocols are: Orchain the Blockchain algorithm and protocol that maintains the transactions and establishes registration order and maintains the mapping between domain names and public keys, Orcache a distributed key-value cache with partial replication and eventual consistency, maintaining the mapping between public keys and subdomain information contents (Jabczyński and Szychowiak, 2015) Orchain Orchain defines a cryptocurrency system, not unlike Bitcoin. Each and every user in the system can create its own asymmetric key pair and use the public part as his/her
3 identifier. Orchain users can transfer units or currency between one another, in exactly the same way as in Bitcoin. The user transactions can be however associated with custom payload that allows users to perform operations on domains register, update and transfer Transactions The fundamental data structure that describes an act of currency transfer is called a transaction. Each transaction can hold a value called payload. The payload is used as a method of announcing domain registrations, tickets and transfers. Orchain users can transfer units or currency (orcoins) between one another, in exactly the same way as in Bitcoin. This will be considered as a voluntary regitration fee. The transaction contains a signature (stored in the field Proof) signed using the private key of the wallet owner. The transaction could in principle allow multiple independent parties to issue a single transaction with multiple inputs belonging to multiple entities, however this was removed to reduce complexity and transaction size. The Blockchain algorithm is the core of Orchain protocol. It is an ever growing tree of structures called blocks. Although Blockchain is always referred to as a list, it is an fact a tree structure. Nodes in the network try to find and redistribute the longest chain in the tree, and ignore the shorter branches. All nodes start the the same block, called genesis block, which is hard-coded into the protocol. Transaction is considered valid if and only if it is stored in one of the blocks in the Blockchain. By using the order of blocks as means of ordering transactions, nodes can establish which transactions spend bills first, avoiding the double spending problem. The first transaction to spend the bill wins, and can be included in the chain. The block is considered invalid if it contains any invalid transaction. Therefore, the whole chain always contains only non-conflicting transactions. Each block has its own unique identifier. It is a 256-bit (32 byte) integer obtained by hashing the Header contents using the SHA256 (NIST, 2002) function. In order for the block to be accepted into the Blockchain, the block identifier must meet a specific criterion, called proof of work. Proof of work is a computationally expensive problem that needs to be solved in order for the block to be considered valid. The more difficult the problem, the more computing power the network needs in order to generate the new block. By auto-balancing the complexity of the proof of work problem (represented as the variable called difficulty), the network can control and maintain a fixed pace of block generation (ideally 6 blocks per hour, or 1 block per 10 minutes). The proof of work problem is essentially a problem of randomly selecting an integer (hash value) lower than a given threshold (called target). The predicate for a valid identifier is the following: Identif ierv alid(block) block.id() < target(difficulty) Where the target(d) is an upper bound limit for the random identifier value. Let S be equal to the number of possible identifier values (in our case ). The target can be obtained from the following formula: 425 ( target(d) = S 1 1 ) 2 1 d As the probability of obtaining any particular value of the hash function is considered equal (we assume that the SHA256 function behaves like a perfect hash function), the average number of attempts required to obtain a valid identifier for the given difficulty is exactly equal to the difficulty value. Any change of the block content results in a different hash value, and a different block identifier. The nonce field can be used freely for that purpose Domain Registration Domain system is the main purpose of the Orwell protocol. Domain names are keys in the write-once storage established by Orwell. The values are public key identifiers, and point to specific cards in the Orcache protocol. Therefore Orchain deals only with the naming system and does not hold the actual domain record data. The fundamental problem that Orwell solves is registration order it allows for all parties to agree on which registration (act of taking the domain) took place first. The first domain registration always wins, and has a defined time period during which it is considered valid. The owner of the valid domain can transfer it at any time and to any account, including its own. In order to prevent users from greedily registering numerous domains, there are limits and rules that describe how the domains can be registered. In each block, only a defined number of domains can be registered. If more registrations is issued than what a block is allowed to contain, registrations with higher fees are accepted. This way the price of the registration can vary in time, and influence the currency value. Moreover, miners are more highly incentivised towards mining, as it yields more profit. The number of domains allowed to be registered per block depends on the registration price (median of the previous fees). If the registration price rises, the number of allowed registrations also rises, and vice versa. This way the number of domain registrations is constantly tuned and managed by the market itself, providing a fair and affordable price while preventing greedy registrations. Registration race is a problem related to disclosing the domain name before it is registered. If the intention of registering a domain name becomes the public knowledge before the registration succeeds, malicious parties can attempt to register the same domain simultaneously with the original party, with the intention of reselling the domain. This scenario is real in some cases with DNS malicious entities host domain checking services, where a user can check if the domain is free to register. The domain check requests can be collected and then used to register the domains before the original user succeeds to do so. This scenario would be even more widespread in a P2P network, especially when not just the intent of registering the domain name is public, but also the attempt to do so. This would make domain registration a tricky and frustrating task.
4 To alleviate this issue, Orwell hides the domain name until the registration has succeeded. No party can know which domain is being registered until it is successfully claimed. To achieve this, the domain registration process is split into three steps: 1. Registration ticket as the registration starts, the domain claimer computes the registration ticket. The ticket is a hash of thedomain data structure, which holds the domain name, designated owner and the lease time. The ticket is included in the payload of a transaction and published in the network. If the transaction fee is high enough, a miner will include the ticket in the Blockchain. 2. Domain announcement after the ticket is accepted in the network, but before 144 blocks are published after it (24 hours), thedomain data structure is published in the payload of a transaction. The hash of the Domain must match the previously announced ticket. This way the network knows what was the actual domain that was registered. 3. Domain confirmation exactly 144 blocks after the ticket was announced, the miner is obliged to check the ticket announced previously. If the ticket has a matching domain (announced in step 2) and if the domain is available (was either not registered or the previous lease has ended), the domain is included in the Domains array field of the new block. The ticket check is obligatory and the block would be invalid if any correctly announced ticket was ignored. In the simplest case, only one person attempts to register a domain. After the ticket is accepted into the Blockchain, the domain is announced and then confirmed. However, the more interesting case happens when multiple parties attempt to claim the same domain simultaneously. If this happens, the ticket order defines the registration priority. If both tickets are announced inside the same block, transaction order inside the Transactions array in the block decides. As the domain name itself is not known at that point, the ticket order is effectively random and therefore fair Name resolution Domain is considered valid if the matching Domain structure is included in the Domains array in any of the blocks, and if the expiration date specified in the ValidUntilBlock field is big enough. In order resolve a domain name, the client needs to have the longest chain in the Blockchain. However, the client is not required to store whole blocks only block headers are required. As each block header is only 896 bits long (112 bytes), users need to store only 5,61 MiB of data per year. This number does not depend on the number of registrations or transactions, and remains proportional only to the block generation rate, which self-stabilizes at 6 block per hour. This amount of data is acceptable even for mobile users. The resolution protocol contains the following steps: Download the longest chain. This can be done continuously and in the background. The downstream rate is low, as only 112B need to be downloaded each 10 minutes. The longest chain can be downloaded by a system process and published to applications as a read-only file. 2. Ask any full peer in the network about the domain. The full peer stores the complete chain (or all currently registered domains). 3. The client checks the received response. The response is valid if: the domain did not expire, the designated block (BlockID) actually exists in the longest chain, the Proof is correct (Jabczyński and Szychowiak, 2015). It must be noted that the response verification requires no prior knowledge given by any authoritative third party the client can obtain the correct Blockchain on its own, asking multiple peers and choosing the longest one. Assuming that the attacker has no control over what connections the client establishes, the client will always be able to get the longest chain and correctly resolve names. The authorization functionality established by Orchain can be used recursively to secure the connections between nodes themselves, further strengthening the network Network protocol and synchronization Orchain works in an unstructured network. Nodes do not need to connect or maintain any particular structure of connections. The only assumption with respect to network topology is that the graph is connected. To minimize the chance of splitting the network, each node establishes random connections and tries to maintain at least 16. The connectedness of the network graph ensures that the gossipbased broadcast of blocks will remain efficient. Once the nodes establish a connection, the synchronization procedure is executed periodically to ensure that both nodes agree on the longest chain. The objective of the procedure is to find a common ancestor (the latest, in the best case) in the tree of blocks and, if the remote peer has a longer chain that descends from the common ancestor, download these blocks. The chain length is compared not by the number of blocks, but the sum of difficulty values associated with blocks. This prevents the nodes from choosing artificially forged blocks with cheap production time and unbounded length. The steps of the procedure are the following: 1. Send themsghead request, containing theid of the last known block in the longest chain, and Work the sum of Difficulty values associated with all blocks in the chain. 2. Receive the MsgTail response. The data structure contains the totalwork done in all blocks known by the remote peer, as well as the Headers array of block headers that descend from the Id specified in the request (if theid is known by the remote peer).
5 3. If: the Headers array is not empty, ask the remote peer for all the unknown blocks specified in the Headers, download them and return, theheaders is empty, but the value ofwork is greater then the local one, re-send the MsgHead request with the Id twice earlier then previously. theheaders is empty and the value ofwork is lower than the local one, return. With the following approach, the peer performs a binary search over the chain to find a common ancestor. After the ancestor is found, the peer compares its own chain with the chain stored by the remote peer. If the remote peer has the longer chain, it is downloaded and applied locally. By using this procedure periodically and asking multiple peers, the longest chain quickly spreads across the network. name space infrastructure. Technical Report RA-2/15, Poznań University of Technology. Nakamoto, Satoshi, Bitcoin: A peerto-peer electronic cash system. [on-line] Nash, John, Equilibrium points in n-person games. Proceedings of the National Academy of Sciences 36(1): NIST, Federal Information Processing Standards Publication 180-2: Secure Hash Standard. [on-line] Szabo, Nick, Trusted third parties are security holes. [on-line] 4. Summary Orwell is a proposal of a decentralized system that provides both secure naming scheme and authentication. By leveraging the breakthrough innovation of Blockchain algorithm, completely new P2P systems can be constructed with much stronger guarantees than before. Cryptocurrency can be used to stabilize P2P networks through the promise of profit. As long as the peers in the network are attracted towards gathering more currency established by the system, the stability of consensus algorithm is guaranteed. The consensus can be used to totally order the transaction registrations, ensuring that all nodes in the network observe the same global state. Orchain works in an unstructured network. Nodes do not need to connect or maintain any particular structure of connections. The only assumption with respect to network topology is that the graph is connected. Orwell introduces various optimizations with respect to Bitcoin and Namecoin. It increases performance through reduction of the size of data structures, modifies the domain resolution algorithm to remove the requirement for the clients to store the complete chain, and separates the domain mapping layer from the data storage layer, increasing throughput and decreasing response time. Many further improvements can be done, specifically concerning performance with respect to memory footprint and attack vectors. Orwell will be developed further, with the focus on developing libraries for various programming languages to enable efficient address resolution. The next goal is integrating the address resolution into Mozilla Firefox via a plugin, thus making the new addressing scheme easily available for normal users. 5. References Gronager, Michael, Namecoin was stillborn, I had to switch off life-support. [on-line] Jabczyński, Michał and Michał Szychowiak, Orwell. Distributed trust system for a dependable domain 427
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
BitIodine: extracting intelligence from the Bitcoin network
BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo http://miki.it [email protected] @mikispag Bitcoin BitIodine About Bitcoin Decentralized, global digital currency A global
MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER [email protected] Invictus Innovations, Inc
MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER [email protected] Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer
Namecoin as alternative to the Domain Name System
Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering [email protected] Marco Davids Supervisor, SIDN Labs Abstract: This paper researches
AsicBoost A Speedup for Bitcoin Mining
AsicBoost A Speedup for Bitcoin Mining Dr. Timo Hanke March 31, 2016 (rev. 5) Abstract. AsicBoost is a method to speed up Bitcoin mining by a factor of approximately 20%. The performance gain is achieved
Bitcoin: A Peer-to-Peer Electronic Cash System
Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [email protected] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally
Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Sia: Simple Decentralized Storage
Sia: Simple Decentralized Storage David Vorick Nebulous Inc. [email protected] Luke Champine Nebulous Inc. [email protected] November 29, 2014 Abstract The authors introduce Sia, a platform for
CoinAMI Coin-Application Mediator Interface
Bilkent University Department of Computer Engineering CoinAMI Coin-Application Mediator Interface Supervisor Can Alkan Members Ahmet Kerim Şenol Alper Gündoğdu Halil İbrahim Özercan Muhammed Yusuf Özkaya
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Filecoin: A Cryptocurrency Operated File Storage Network
Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike
Blockstack: A Global Naming and Storage System Secured by Blockchains
Blockstack: A Global Naming and Storage System Secured by Blockchains Muneeb Ali and Jude Nelson, Princeton University and Blockstack Labs; Ryan Shea, Blockstack Labs; Michael J. Freedman, Princeton University
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:
SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will
An Analysis of the Bitcoin Electronic Cash System
An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Methods to increase search performance for encrypted databases
Available online at www.sciencedirect.com Procedia Economics and Finance 3 ( 2012 ) 1063 1068 Emerging Markets Queries in Finance and Business Methods to increase search performance for encrypted databases
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
Scaling Web Applications in a Cloud Environment using Resin 4.0
Scaling Web Applications in a Cloud Environment using Resin 4.0 Abstract Resin 4.0 offers unprecedented support for deploying and scaling Java and PHP web applications in a cloud environment. This paper
The World of Emerging Payment Systems A Brief Introduction
The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Bitcoin: Concepts, Practice, and Research Directions
Bitcoin: Concepts, Practice, and Research Directions Ittay Eyal, Emin Gün Sirer Computer Science, Cornell University DISC Bitcoin Tutorial, October 2014 Barter Gold Fiat 2 Barter Gold Fiat Bitcoin 2008:
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Namecoin. Andreas Loibl
Namecoin Andreas Loibl Betreuer: Johannes Naab Seminar Innovative Internettechnologien und Mobilkommunikation SS2014 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
IoT Babelchain. Proof of Understanding. How Machines learn to communicate
IoT Babelchain Proof of Understanding How Machines learn to communicate Benedikt Herudek ([email protected]) April2016 Linux Foundation Open IoT Abstract Having Machines talk to each other is
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Lecture 10: Regression Trees
Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer.
COINSPARK ASSET ISSUE AGREEMENT ISSUE DETAILS Variable Name Value Explanation CoinSpark Asset Coupons for CoinSpark Asset Demonstration Full display name of the CoinSpark Asset. Issuer An example retailer
More on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Security Mechanisms in Bitcoin
Security Mechanisms in Bitcoin Henrik Lovén Joakim Valberg Email: {henlo585, joava054}@student.liu.se Supervisor: Ulf Kargén, {[email protected]} Project Report for Information Security Course Linköpings
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES
GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES [email protected] Contents Abstract... 3 Background... 3 Security... 3 Data Control... 4 Standards... 4 Payment
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
OpenAutonomy Authentication
OpenAutonomy Authentication Open Autonomy Inc. January 2014 Abstract: A system of federated components, such as OpenAutonomy, requires a protocol to authenticate messages between servers so that a message's
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Bitcoin Miner Optimization
Bitcoin Miner Optimization Nicolas T. Courtois - University College London, UK Bitcoin Mining Bottom Line Bitcoin Mining = a high tech race to determine who will own the currency of the 21 century 2 Nicolas
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
