An Efficient Implementation For Key Management Technique Using Smart Card And ECIES Cryptography
|
|
|
- Bathsheba Hillary Bradford
- 9 years ago
- Views:
Transcription
1 An Efficient Implementation For Key Management Technique Using Smart Card And ECIES Cryptography Neha gupta 1 and Harsh Kumar Singh 2 and Anurag jain 3 1,2,3 Department of Computer Science, RITS Bhopal, M.P(India) ABSTRACT A Elliptic curve cryptosystem are become popular because of the reduced number of keys bits required in Comparision to other cryptosystem. In existing work ECC technique are used to describe the encryption data to provide a security over a network. ECC satisfy the Smart cards requirements in term of memory, processing and cost. In existing work ECC cryptographic Algorithm work with a smart card technique. Many existing approaches work with smart card with various Technique and produce a better efficient result. In these review paper, we Define a smart card technique using a ECIES cryptographic algorithm. So These Technique key management using smart card and ECIES.ECC basically based on a discrete logarithm over appoint on an elliptic curve. The ECIES is standard elliptic curve that is totally based on encryption algorithm. Smart Card using ECIES technique in key management technique. KEYWORDS ECIES, elliptic curve, encryption, Decryption, public key cryptography, Smart card, java card. 1. INTRODUCTION In Public key cryptography several cryptosystems have been proposed. Mainly Security and efficiency are the most important features to be requested to any cryptosystem. Generally both characteristics depend on the mathematical problem on which it is based The most extended encryption scheme in ECC is the Elliptic Curve Integrated Encryption Scheme (ECIES). In other word Smart card is a plastic card that contain a microchip in which a lot of information about the user. Generally Smart Card have their stored data can be protected against unauthorized access and tampering. Smart card is considered to be ideal cryptographic token. Smart Card based on key management and key authentication.it consider a registration phase, login phase, Authentication/verification phase, password change phase. To generate a smart card we follow a some step In first stage,first is registration phase, Login phase, verification phase, password change phase. In registration phase we generate a hash value through a hash function, that is a master key. In login phase user provide a facility a to secure a login, through a user id and password which generate by a registration phase. In verification phase user receiving a login request message. In password change phase if user want to change the password PW with a new password PW new, then user U insert the smart card to the card reader/client machine and keys in ID* and PW* and request to change password. The most extended encryption scheme in ECC is the Elliptic curve integrated encryption Scheme (ECIES). The Elliptic curve integrated encryption system (ECIES) is the standard elliptic curve based on encryption algorithm. ECIES is a public key encryption algorithm like ECDSA.ECIES for portable devices, Application and for the future DOI : /ijctcm
2 and this, in the end, is the reason ECIES is a stronger option than the RSA and discrete logarithm systems for the future Characteristics Of ECIES (a). ECIES provide a security for a given key size. (b). ECIES provides secure and efficient hash techniques. (c). ECIES are totally based on the elliptic curve, in which the smaller key size make also possible combination. it provide a faster cryptographic operations run on smaller chip, that is smart card. An elliptic curve is defined in a standard mathematical form. It define a two dimensional x, y Cartesian coordinate system by an standard elliptic equation of the form: y 2 = x 3 + ax + b. The graph turns out to be gently looping lines of various forms. Generally key management scheme based on a encryption key for secure the channel over the network. Mainly Communication parties used a pair wise key used to secure a channel, for direct and indirect communication.in Cryptography, almost all of the encryption techniques are dependent on the key, so key management is the basis for a security mechanism. Key management is the vital component but it is also a weak link. Key management Life cycle generally includes User registration, user initialization, key generation key installation, key registration, key backup, key update, key recovery, key revocation. Fig (a): An Elliptic Curve 2. WORK ACCOMPLISHED SO FAR Researcher are continuously working on Key management scheme using Smart card, few of them are described here:- Very (a) Patrick George states that[2],smart card are provide a separation between a platform and user. It provide a trustworthiness relationship between a user and server.tpm(trusted platform module) authorization protocol in order to implement smart card based user access control to TPM protected resources. The TPM or smart card demonstrate physically separate the platform credentials stored in TPM which stored in smart card, then generate a TPM and smart card cooperative model. The first model generally introduced a general purpose model. and provide a same service as smart card. Other model simply the implement TPM with smart card. But TPM or Smart card are provide a single storage point both user and platform. These TPM-and-smartcard model is based on the strict separation between user and platform credentials, and on the tight integration of smart cards into TPM user authorization protocols. The TPM-and-smartcard model is based on the strict 30
3 separation between user and platform credentials, and on the tight integration This model presents the TPM working together with smart cards. In their day-to-day activities, users are interacting more and more with many different computing environments, even to perform the same operation. For example, a user may send business s from different PCs (business, home, Internet-cafe) or from different types of devices (PC, PDA); under these circumstances the user will use the same credential on different platforms, the ones attached to digital signature issued by the corporate MIS. It is clear that, in this case, storing this credential inside a nonremovable device, such as the platform TPM, is impracticable and will raise issues when the user switches to different platforms. User authentication in TCG in which authorization the data and protocol. In these paper future work defined a additional synergies in TPM and Smart Card. These smart card stored a user secret information and credential, and enhanced the digital signature to secure a communication. (b)a.k. Awasthi & Sundar lal States that[3] it proposed a new remote user authentication scheme using smart card. Masquerade Attack is successful in this scheme. Some researchers point out a different type of attack on this scheme & presented a modified scheme to remove these effects. Recent research have suggested idea of check digit to overcome the above attack. A no. of remote password authentication scheme with smart card have been proposed since then. These new remote user authentication scheme based on a cryptosystem. in these scheme it allow a valid user login on remote server and access the services which provided by a remote server. The researcher Awasthi and Lal also proposed scheme which also remove a threats. In these proposed work it proposed a Initial phase, registration phase, login phase and authentication phase. Firstly user registered and login through a user id and password and issues a smart card. These smart card holding user related information through a secure channel. user insert a smart card into a device and keys the password. Some attack are described in these paper. Such as Chan & Cheng s attack, Shen-lin-Hwang s attack and Chang & Hwang s attack: Chan & Cheng equation is : Is modified to IDj = (IDb IDb ) mod p. IDj = (IDb)r mod p. Where r is a arbitrary integer. These new remote user authentication scheme is modified form of Hwang-li s scheme and uses one more function CK to generate a check bits for registered identity. If customer id and check digit are same(xor) then condition processed otherwise rejects. in this paper result is incomplete still it is essential to obtain the check bits corresponding the ID. In these conclusion These scheme is more essential then the other scheme. It provide a secure scheme against a both type of attacks: Attack via registration phase and attack via authentication phase. (c)b. Baker[4] states that The world wide web has become the de facto interface for consumer oriented electronic commerce. So the interaction between consumer and merchants is mostly limited to providing information about product and credit card based payments for mail orders. These scheme describe the design of new three party authentication and key distribution protocols. The authentication protocol features three parties: A client(consumer), A server(the service provider), and a trusted third party(the smart card issuer. e.g bank).some elements are describe such as Identificators (both client and user use to prove their identity), trusted third 31
4 party(the issuer of identificators), Semi trusted computing based(secure application runs in this environment).a trusted third party not need to give a any response before both client and server not authenticated. The kryptoknight protocol need to calculate the authentication code over messages. The kryptoknight protocol all the TTP(trusted third party) generate session key and distribute it to a server and client over a network. In these new algorithm scheme, a different distribution scheme, in which proposed party A generate a session key, transports it encrypted (via party B) to the TTP, which decrypts the key and finally send to party B, and then party B Reencrypted with a key known to B. So in this case the session key is transported (from A to B) rather than distributed (from the TTP to A and B). A and B generate cryptographic proofs before contacting the trusted third party. In the same effort the session key can be generated as well: party A generates session key KAB with the same parameters as proof PAK it sends to the TTP. The basic KLOMP protocol has been designed to be implementable with any challenges/response capable Identificator. With some Identificators the protocol can be enhanced for better security. In this scheme for testing purpose also a password based challenge/response identificator has been built. The smart card access code has been applied in project for the LISV. User easily register and login to the HTTP based application by entering their chipper and chip knip card. (d) Rajaram Ramasamy and Amutha prabakar Muniyandi states that[5] In this scheme it proposed that efficient password authentication with smart card applying RSA. These proposed scheme define a maximun attacks with minimum computational cost. Remote user authenticaton using smart card is a good solution for any e-based applications.to access resources at remote system, user should have proper access rights. One of the simplest and efficient mechanism is the use of a password authentication scheme. To access the resources user should have own user ID and PASSWORD. This work propose an efficient password authentication scheme with smart card using RSA. In these proposed scheme has three phase Registration phase, Authentication Phase, and login Phase.In these proposed scheme security issues The attacker cannot create or update the false information for login. In proposed scheme, if login request is rejected three time then automatically the user account is locked and the user has contact server to unlock the account. The proposed protocol overcomes the DOS attack over the computation power of the server. In these proposed scheme if the smart card of user are lost the adversary cannot use this card without knowing the password of the user. if any case adversary want to change the password he/she must know the original password. Some Security Analysis in these scheme: (i) Denial of service attack (ii) Parallel Session Attack (iii) Smart card loss attack. These proposed scheme has high time complexity and that improved security level from already existing scheme. The proposed scheme restricts most of the well known attacks with the reasonable Computational cost. Server not need to maintain a password table,instead it to maintain onlt registration time of every user. This work reduce the server overhead of maintaining large user data for authentication. 3. PROPOSED METHODOLOGY 3.1. KEY MANAGEMENT LIFE CYCLE: 1. user registration 2. user initialization 32
5 3. key generation 4. key installation 5. key registration 6. key update 7. key de-registration and destruction 8. key recovery 9. key revocation 3.2. Smart Card based key management and authentication 1-Registration phase 2-Login phase 3- authentication/verification phase and 4-password change phase. Key management Smart card technology Registration phase Login phase Verification phase Password change phase ECIES cryptography technique Generate MAC Using key deviation function ECIES encryption ECIES decryption Output Fig(b):Key management process using smart card The notations use in proposed scheme and phases are describe below-the Notations are: 33
6 U Remote User ID Identity of User PW password chosen by User S Remote authentication Server X Permanent secret key of S H ( ) One-way hash Function xor Bitwise XOR operation concatena 3.3. ECIES Fig(c):Flowchart of phases smart card ECIES is a public-key encryption algorithm where there is assumed to be a set of domain parameters(k,e,q,h,g).with these parameters, we also add a choice of symmetric encryption/decryption functions which we shall denote Ek(m) and Dk(c).The use of a symmetric Encryption function makes it easy to encrypt long messages. in addition instead of a simple hash function. we require two special Types of hash function: A message authentication code MAC k(c) MAC: {0.1}^n * {0,1}^* {0,1}^m This Acts precisely like a standard hash function expect that it has a Secret key passed to it as well as a message to be hashed 34
7 A key derivation function KD(T,1) KD : E * N {0,1}^* A key derivation function acts precisely like a hash function except that output length could be quite large. The output is used as a key to to encrypt a message hence if the key is to be used in a xor-based encryption algorithm the output needs to be as long as the message is being encrypted. The x-or based encryption requires key derivation and the MAC function to encrypt the message on the basis of x-or operation on bits. The ECIES scheme works like a one-pass Diffie Hellman key transport, where one of the parties is using a fixed long term rather than an ephemeral one. This is followed by symmetric encryption of the actual message. For example the combined length of the required MAC key and the required key for the symmetric encryption is given by l. The recipient is assumed to have a long-term public /private key pair ( Y,x) where Y=[x]G ECIES Encryption: INPUT: Message m and public key OUTPUT: The ciphertext (U,c,r) 1. Choose k R(1.q-1) 2. U [k]g 3. T [k]y 4. (k1 k2) KD(T,l) 5. Encrypt the message c Ek1(m) 6. Compute the MAC on the ciphertext r MACk2(c) 7. Output (U,c,r) ECIES Decryption: INPUT: Ciphertext ( U,c,r) and a private key r. OUTPUT: The message m or an invalid ciphetext message. 1. T [x]u 2. (k1 k2) KD(T,l) 3. Decrypt the message m Dk(c). 4. if r MACk2(c) then output Invalid Ciphertext 5. output m. 4. COMPARISION BETWEEN EXISTING WORK AND PROPOSED WORK In existing work,it use a smart card technology based on remote user authentication scheme. In proposed work, we use a smart card technology based on ECIES cryptography algorithm. Both existing and proposed work using a one way hash function which generate a hash value and bitwise exclusive OR operation. Generally smart card key management and authentication have four phase: registration phase, login phase, authentication phase/verification phase & password change phase. In existing work, it used a remote user authentication scheme against a denial attack and stolen smart card etc. In other word proposed work consist a ECIES algorithm to provide a encryption and decryption technique. It convert a plain text into a cipher text & vice versa. ECIES a public key encryption technique. It provide a secure message passing between a 35
8 network. ECIES encryption algorithm provide a secure and efficient hash technique. It is based on elliptic curve & it contain a smaller key size make possible combination. 5. RESULT ANALYSIS Table 1: Various Steps take time in sec. Table 2: Various Attacks Prevent in technique Fig(d):No.of key comparision in Sec. Table 3:Comparision between existing and proposed work 36
9 6. CONCULSION In These proposed work smart card work efficiently with the ECIES Cryptography technique. In These paper we use a smart card based key management and authentication technique. In which smart card authentication stage contains a registration phase, login phase, registration phase, and password change phase and using a ECIES public key encryption algorithm. These algorithm define a symmetric encryption and decryption function. These proposed scheme provide a better efficient result and secure a network. 7. REFERENCES [1] Swarn Sanjay Sonwanshi,Ram ratan ahirwal,yogendra kumar jain An efficient smart card based remote user authentication scheme using hash function,ieee,conferences on electrical,electronics and computer science,2012. [2] Patrick george user authentication with smart card in trusted computing architecture Gemplus. [3] A.k.awasthi and S.lal, A remote user authentication scheme using smart card with forward security,ieee transactions on consumer Electronics,Vol.49,.no.4,pp, ,2003. [4] B.Baker Mutual Authentication with smart card Delft university of technology,chicago,illinois,usa,may [5] R. ramasamy and Amutha prabakar Muniyandi An efficient password authentication scheme for smart card,international journal of network security,vol.14,no.3,pp ,may [6] R. ramasamy and Amutha prabakar Muniyandi new remote Mutual Authentication scheme using smart card transaction on data Privacy 2(2009) [7] C. K. Chan and L. M. Cheng, Cryptanalysis of a remote user authentication scheme using smart cards, IEEE Trans. Consumer Electron., vol. 46, pp , [8] C. C. Chang and S. J. Hwang, Using smart cards to authenticate remote passwords, Computers and Mathematics with applications, vol. 26, No.7, pp , [9] C. C. Chang and K. F. Hwang, Some forgery attack on a remote user authentication scheme using smart cards, Infomatics, vol. 14, no. 3, pp , [10] C. C. Chang and T. C. Wu, Remote password authentication with smart cards, IEE Proceedings-E, vol. 138, no. 3, pp , Authors Neha Gupta received the B.E degree in Computer science from RGPV university, Bhopal, India in 2009,And the M.TECH pursing in Computer science & engineering From RITS, RGPV, Bhopal. Harsh Kumar Singh received the B.E degree in information technology from RGPV university, Bhopal, India, In 2006,and the M.TECH degree in computer science & engineering from MANIT university, Bhopal, India in 2011.He is a currently a Asst. Prof. in RITS Bhopal, India. His current research interests include wireless sensor network, time synchronization. Mr.Anurag Jain is a associate Professor and head of the department of CSE in Radharaman institute of technology & science Bhopal.He is also the dean academics RITS. Anurag Jain has completed his M.tech(IT),He is also pursing Phd.in RGPV university. He is 12 year teaching experience and area of interest including network security. TOC, data structure, OOPs, Basic computer, Complier design. He is organized and attend several national and international conferences.he also published 36 international journal paper and 2 national paper. He is also published a book of basic computer engineering.he is life member of CSI(Computer socity of india). 37
10 INTENTIONAL BLANK 38
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Secure File Transfer Using USB
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 Secure File Transfer Using USB Prof. R. M. Goudar, Tushar Jagdale, Ketan Kakade, Amol Kargal, Darshan Marode
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Data Security in Cloud Using Elliptic Curve Crytography
Data Security in Cloud Using Elliptic Curve Crytography Puneetha C 1, Dr. M Dakshayini 2 PG Student, Dept. of Information Science & Engineering, B.M.S.C.E, Karnataka, Bangalore,India 1 Professor, Dept.
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Secure Data Storage in Cloud Service using RC5 Algorithm
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-5 November 2013 Secure Data Storage in Cloud using RC5 Algorithm Sachindra K. Chavan, Manoj L. Bangare
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
A SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK
SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Design of a Secure File transfer System Using Hybrid Encryption Techniques
, October 21-23, 2015, San Francisco, USA Design of a Secure File transfer System Using Hybrid Encryption Techniques Abdeldime M.S. Abdelgader, Lenan Wu, Mohamed Y. E. Simik and Asia Abdelmutalab Abstract
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems Changgeng Yu; Liping Lai School of Mechanical and Electronic Engineering, Hezhou University, No.8, xihuan Road,
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
