A Digital Signature Scheme in Web-based Negotiation Support System
|
|
|
- Nora Gilmore
- 9 years ago
- Views:
Transcription
1 A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada [email protected] 2 School of Computer, Wuhan University, Wuhan, P. R. China, [email protected] Abstract. With the rapid development of electronic commerce, digital signature is very important in preventing from forging, tampering, and disavowing electronic contract in web-based negotiation support system (WNSS). Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures, a digital signature scheme for electronic contracts is presented in the paper. Public key algorithm, hash function and interceders are used in the scheme. The feasibility and implementation of the scheme in WNSS are discussed. 1 Introduction The web-based negotiation support system (WNSS) has been developed and applied in electronic commerce, which could be used to support the negotiators to negotiate through Internet [1, 2]. WNSS can provide real-time remote supports and services in every phases of negotiation. Negotiators can use WNSS to deal with business negotiations and bargaining at any place of the world conveniently. In the traditional business negotiations, two parties of the negotiation usually sign or stamp on the paper contract, if the negotiation is successful, namely black and white. In this way we can identify trade associates, confirm the reliability of contract and prevent from disavowing. However, when the negotiators agree with a protocol or electronic contract in WNSS, we also need credible identification and implement digital signature to prevent from disavowing. Furthermore, the electronic contract without signatures is easily modified. And the integrity and authenticity of the contract can t be assured. Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures [3-8], this paper presented a digital
2 622 Yuxuan Meng 1 and Bo Meng 2 signature scheme for electronic contracts in WNSS, which use public key algorithm, hash function and interceders. The digital signature scheme can assure the reliability of electronic contracts and prevent from disavowing effectively. The feasibility and implementation of the digital signature scheme in WNSS are discussed. 2 Digital Signature and Digital Certificates 2.1 Digital Signature The real purpose of a signature is for an individual/entity to provide a stamp of approval of the data or document under review. In today s world, almost every legal financial transaction is formalized on paper. A signature or multiple signatures on the paper guarantee its authenticity. The signature is typically used for the purposes of user authentication and document authentication. Signatures on the paper have two functions. One is preventing from disavowing, so that we can confirm that the file has been subscribed. Another is preventing from copying, so that we can confirm the reality of the file. Digital signatures have the same functions of paper-based signatures. However, the digital signatures are more different from paper-based signatures. Because the digital signatures are so dependent on the actual data content, they are very suitable for digital data, which can be tampered with quite easily. The digital signatures have especial problems to be solved. Firstly, the digital file is easily to be copy, even the digital signature is difficult to forge, but cutting and plastering valid signature is so easy. Secondly, the digital file is easily to modify after the digital signature, and the modified file won t leave any trace. Thus simple graphic tag that simulates manual signature can t be used for digital signature. Digital signature should have some characteristics as follows. (1) Digital signature should use the information that can only identify signatory. (2) The content of the message that would be signed can be authentication before signature. (3) Digital signature could be validated by the third party in order to resolve dispute. Obviously digital signature not only has the function of identification, but also authentication. Digital signature can be used to preventing from forging signature, tampering information, sending message in the name of other people and denying the information that has been sent/received. 2.2 Digital Signature Algorithms Symmetric algorithms with interceder The precondition of this algorithm is that sender and receiver fully trust interceder. Let S, T, R denote sender, interceder and receiver respectively. Then the algorithm is described as follows [3, 4]. (1) S and T share key K A, R and T share key K B.
3 A Digital Signature Scheme in Web-based Negotiation Support System 623 (2) S encrypt file M with K A to generates K A (M). Then S sends K A (M) to T. (3) Because only S and T share K A, if T can decrypt K A (M) with K A, T can confirm the message coming from S. Then T write a declaration D to prove that he have received the M from S. At last T use K B to encrypt M and D: K B (M, D). (4) T sends K B (M, D) to S. (5) S use K B to decrypt K B (M, D), then gets M and D. From D, S could assure the M comes from S Public key algorithms Public key algorithms are asymmetric algorithms, which are very suitable for digital signature, because they have public key and private key. It is very important to choose the private key for using Public key algorithms to encrypt file. The keys must meet three conditions: SK(PK(M))=M PK(SK(M))=M. To calculate SK from PK is very difficult. It is impossible to determine the M from part of plaintext. The algorithm is described as follows [3, 4]. (1) S encrypts plaintext M with his own private key SK to generate SK (M). (2) S sends SK (M) to R. (3) R decrypts with S s public key PK to get M. If R could carry out step (3), the digital signature of S is valid Public key algorithm with hash function The efficiency of using public key algorithm to encrypt long file is very low. Therefore hash function is always used with public key algorithm at the same time, in order to improve efficiency. In this way, sender needn t encrypt the whole file, he only to encrypt the hash value of the file. The sender and receiver should negotiate and determine the hash function and digital signature algorithm in advance. The algorithm is described as follows [3, 4]. (1) S uses a hash function to generate hash result H (M) of the file M. (2) S encrypts H(M) with his own private key SK to get SK(H(M)), namely digital signature. (3) S sends M and SK (H (M)) to R. (4) R also uses the same hash function with S to generate H (M) of the M, and decrypts SK(H(M)) with S s public key PK to get H(M). If H (M)=H(M), then the digital signature is valid. 2.3 Digital Certificates If digital signature is based on public key algorithms, there are two problems obviously. At first, how to ensure the owners of the public keys are authentic. Secondly, how to deal with the production, distribution and management of the public keys. Certification Authority (CA) can resolve above problems. The authenticity of public keys may be established by a trusted third party. A guarantee of the identity of the owner of a public key is called certification of the public key. A person or organization that certifies public keys is known as a Certification Authority (CA). The digital certificate is the evidence as identity of the person or organization on Internet. It includes the owner s name, public key, CA s digital signature, the
4 624 Yuxuan Meng 1 and Bo Meng 2 period of validity of the digital certificate, etc. Digital certificate can provide identity and authenticity, so it is widely used in electronic commerce. 3 A Digital Signature Scheme in WNSS 3.1 Requirements of Digital Signature in WNSS It is very important for both negotiators to sign the contract by the end of the negotiation, because the signed contract is the voucher of the business trade. To insure the validity, fairness of the signature and prevent from disavowing, the digital signature in WNSS should satisfy the following requirements. (1) The digital signature of both negotiators of the negotiation is authentic. Any negotiator can confirm the signature he received comes from the other party of the negotiation, but not from someone else. (2) The digital signatures of the negotiators can t be forged. Only negotiators can sign the contract, anyone else can t forge their signatures. (3) The digital signatures of the negotiators can t be used repeatedly by other people. The signature is a part of the contract. Anyone else can t transfer the signature to other files. (4) The context of the contract that both negotiators should sign must be same. In the process of transfer, the context of the contract can t be tampered. (5) The digital signature of both negotiators is of non-repudiation. After both negotiators have signed the contract, they can t deny their signatures. (6) The digital signature of both negotiators is fair. At the end of the process of signature, the result is both negotiators having received the other party s signature or both negotiators having not received the other party s signature. (7) If the context of the contract was very confidential, it could be seen by both negotiators only. 3.2 The Digital Signature Scheme in WNSS Taking into account of the requirements of digital signature in WNSS and several algorithms widely used in digital signatures, we designs a new digital signature scheme for electronic contracts in WNSS, which uses public key algorithm, hash function and interceders. Let A and B be two negotiators of the negotiation respectively. Let PK A, PK B, PK C be the public keys of the negotiator A, B and interceder respectively. Let SK A, SK B be private keys of the negotiator A, B respectively. Let H be hash function. Let M be the plaintext of the electronic contracts. The digital signature scheme is described as follows. A encrypts M with B s public key PK B to generate PK B (M). A use hash function to generate hash result H(M). Then, A encrypts H(M) with his private key SK A to sign the M. And SK A (H(M)) is called the digital signature. Furthermore, A
5 A Digital Signature Scheme in Web-based Negotiation Support System 625 encrypts H(M) and SK A (H(M)) with C s public key PK C to generate a information packet ATC: PK C (H(M) SK A (H(M))), which would be transferred to C by B. A sends PK B (M), H(M) and ATC to B. B will decrypt PK B (M) with his own private key SK B to get M. Then B uses the same hash function as A to generate his own hash result H (M). If H(M)= H (M), then B can be sure M has not been changed during transference. Then B encrypts H (M) with his own private key SK B to sign the M. And SK B (H (M)) is B s digital signature. B sends H (M), SK B ( H (M)) and ATC to C. C decrypts ATC with SK C to get H(M) and SK A (H(M)). Then C will compare H(M) with H (M). If it is different, then M is changed during transference. Hence the digital signatures of both negotiators are invalid. If it is same, then the M that B signed is the same as that A signed. Then C will decrypt SK A (H (M)) and SK B (H (M)) with PK A and PK B respectively. If H(M) H (M), the digital signatures by both negotiators are incorrect, then the signatures are invalid. If H(M)=H (M), then C can ensure the signatures by both negotiators are valid. If the digital signatures by A and B is valid, then SK B (H (M)) is timestamped and sent to A by C, and SK A (H(M)) is also time-stamped and sent to B by C. 3.3 The Feasibility Analysis of the Scheme The feasibility of the scheme is analyzed as follows. (1) The digital signatures are authentic. Because C is a trusted interceder by both negotiators, the digital signatures that received by each negotiator are verified and confirmed by C. (2) The digital signatures are not forged. Because only negotiators have their own private keys, if interceder can decrypt signatures with negotiators public keys respectively, he will know the signatures are not forged. (3) The digital signatures can t be used repeatedly. Because that the negotiators signed is the hash result of contract, the signatures can t be copied to another contracts. (4) The digital signature scheme can satisfy the integrity requirement of the contract. In the step of the scheme, if the context of H (M) and H(M) is different, we can discover the context of contract that each negotiator signed is different and the contract is changed by someone else in the transfer process. (5) The digital signature scheme can satisfy the requirement of non-repudiation. Because both negotiators receive signed contract that is time-stamped and sent by interceder, they can t deny their signatures. The interceder can verify and prove the signatures of the both negotiators. (6) The digital signature scheme can satisfy the fairness requirement. After the interceder has verified that the signatures are valid, both negotiators can receive the other negotiator s signature of the contract. Otherwise, both negotiators can t receive the other negotiator s signature of the contract. Both negotiators are in the strong fairness situation. And the interceder couldn t see the context of the contract.
6 626 Yuxuan Meng 1 and Bo Meng 2 (7) The execution efficiency of the scheme is very high, because negotiators only encrypt the hash result and the interceder needn t to transfer the contract. The interceder only do a few public key operations and signature verifications, then sent verified signatures to negotiators. (8) In the digital signature scheme, the transferred contract can also be encrypted with keys that are different from signature keys in order to improve the security of the scheme further. 3.4 Implementation of the Digital Signature Scheme in WNSS Generally a trusted third party is needed to provide service and intercede negotiation through WNSS. The third party can aid the negotiators in the process of the negotiation. Therefore, the trusted third party in WNSS can act as the interceder of the digital signature scheme. Because we use public key algorithm to encrypt contract, we need a CA to provide certificate service. In a similar way, the trusted third party can act as CA. As we all know, MS NT 4.0 is widely used in Intranet and Internet. And in the Option Pack the software named Certificate Server1.0 can be used to construct our own CA conveniently and to realize the authorization and certification to the web server and client. The both negotiators can adopt X.509 certificate. The digital certificate can not only implement the bi-directional authentication in SSL connection, but also implement digital signatures with the keys in the certificate. RSA is one of public key algorithm that is well known with its high security. It is especially suitable for using in digital signature. The algorithm of RSA is as follows. Public key: n = p q. (p and q are two large prime numbers and are secret.) Private key: d= e 1 mod ((p-1)(q-1)). (e is relatively prime to (p-1)(q-1). e and n are public.) Signature procedure: S=M d mod n Validation procedure: V(M, S)=TRUE M=S e mod n Up to now many hashing algorithms have been designed, such as Rabin hash algorithm, N-hash algorithm, MD2, MD4, MD5, SHA and so on. MD5 produces a 128-bit (16-byte) hash result. The security of MD5 algorithm is higher and its operation speed is very fast, so that it is widely used. In WNSS we use RSA and MD5 to implement digital signatures for electronic contract. As a network programming language, JAVA is rapidly developed and widely used in Internet. JAVA integrates a number of security tools. It can be used to develop multifunctional application programs that include identity certification, digital signature, encryption, decryption, etc. JAVA is also used to implement webbased negotiation support system. Therefore we use JAVA to develop and implement our digital signature application programs in WNSS.
7 A Digital Signature Scheme in Web-based Negotiation Support System Conclusions Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures, a new digital signature scheme for electronic contracts is presented in the paper. Public key algorithm, hash function and interceders are used in the scheme. The feasibility of the scheme is analyzed. It has been implemented in our web-based negotiation support system. Digital signatures could be used to prevent from forging, tampering and disavowing, so it is one of the important techniques in electronic commerce. With the development of electronic commerce, the techniques in network security that include digital signature will be more and more important in our lives. Acknowledgment This research was supported by China Scholarship Council and the Natural Science Foundation of Hubei province of China (Project No. 2001ABB058). References 1. B. Meng and W. Fu, An Overview of Theories and Models in Group Decision Making and Negotiation Support Systems, Proceedings of '99 International Conference on Management Science and Engineering, W. Gao and B. Meng, Research and Development of Web-based Negotiation Support System, Computer Engineering, 29 19, 63-65(2003) (in Chinese) Mohan Atreya, et al., Digital Signatures ( McGraw-Hill, Berkeley, Calif., 2002) J. C. A. van der Lubbe, Basic Methods of Cryptography (Cambridge University Press, New York, 1998) Timothy P. Layton, Information Security: Design, Implementation, Measurement, and Compliance (Auerbach Publications, Boca Raton, 2007). 6. Elena Ferrari and Bhavani Thuraisingham, Web and Information Security (IRM Press, Hershey, Pa., 2006). 7. Aashish Srivastava, Electronic Signatures: A Brief Review of the Literature, Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet ICEC '06, August Mark Stamp, Information Security: Principles and Practice (Wiley-Inter Science, Hoboken, N.J., 2006).
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Pre requisites for Digital Signature
Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Instructions on TLS/SSL Certificates on Yealink Phones
Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE FENG Ziliang*, PAN Weijun* / ** 1, WANG Yang* * Institute of Image and
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
How To Create A Digital Signature Certificate
Tool. For Signing & Verification Submitted To: Submitted By: Shri Patrick Kishore Chief Operating Officer Sujit Kumar Tiwari MCA, I Year University Of Hyderabad Certificate by Guide This is certifying
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com [email protected] Version.05 9/2012 1 Certificate Use Overview
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
