An Oblivious Password Cracking Server
|
|
|
- Valerie Fox
- 9 years ago
- Views:
Transcription
1 An Oblivious Password Cracking Server Aureliano Calvo - [email protected] Ariel Futoransky - [email protected] Carlos Sarraute - [email protected] Corelabs Core Security Technologies An Oblivious Password Cracking Server / 26
2 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
3 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26
4 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26
5 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26
6 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26
7 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26
8 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26
9 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26
10 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26
11 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26
12 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
13 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
14 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26
15 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26
16 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26
17 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26
18 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26
19 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26
20 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26
21 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26
22 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26
23 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26
24 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
25 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
26 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
27 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
28 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
29 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
30 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26
31 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
32 Problem to be solved Ask for a bit in a database stored by a server without revealing the requested bit to the server. Without sending the entire database (!). An Oblivious Password Cracking Server / 26
33 Problem to be solved Ask for a bit in a database stored by a server without revealing the requested bit to the server. Without sending the entire database (!). An Oblivious Password Cracking Server / 26
34 Problem to be solved "Something being imposible does not imply that it has never been done" (Fernando Russ) An Oblivious Password Cracking Server / 26
35 Classic PIR Eyal Kushilevitz and Rafail Ostrovsky Replication is not needed: Single database, computationally-private information retrieval. Proceedings of the 38th Annu. IEEE Symp. on Foudations of Computer Science, pages: , An Oblivious Password Cracking Server / 26
36 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26
37 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26
38 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26
39 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26
40 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
41 Our Work Hellman Tables With Distinguished Endpoints as Hash-Reversing Tables queried using Classic PIR. An Oblivious Password Cracking Server / 26
42 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26
43 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26
44 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26
45 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26
46 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26
47 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26
48 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26
49 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26
50 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26
51 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26
52 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26
53 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26
54 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26
55 Experimental Results An Oblivious Password Cracking Server / 26
56 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26
57 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26
58 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26
59 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26
60 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26
61 Any Question? An Oblivious Password Cracking Server / 26
62 Thank you! An Oblivious Password Cracking Server / 26
Cracking Passwords With Time-memory Trade-offs. Gildas Avoine Université catholique de Louvain, Belgium
Cracking Passwords With Time-memory Trade-offs Gildas Avoine Université catholique de Louvain, Belgium SUMMARY Motivations Hellman Tables Oechslin Tables Real Life Examples Fingerprint Tables Conclusion
NETWORK SECURITY: How do servers store passwords?
NETWORK SECURITY: How do servers store passwords? Servers avoid storing the passwords in plaintext on their servers to avoid possible intruders to gain all their users passwords. A hash of each password
A novel time-memory trade-off method for password recovery
available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin A novel time-memory trade-off method for password recovery Vrizlynn L.L. Thing*, Hwei-Ming Ying Institute for Infocomm
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
Attacking NTLM with Precomputed Hashtables
Attacking NTLM with Precomputed Hashtables warlord [email protected] Contents 1 Introduction 2 2 The design of LM and NTLM 3 2.1 The LanMan disaster......................... 3 2.2 NTLM.................................
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Query Services in Cost Efficient Cloud Using Query Analysis
Query Services in Cost Efficient Cloud Using Query Analysis VanthanaPriya.J 1, ArunKumar.B 2 PG Scholar, Department of CSE, Karpagam University, Coimbatore, Tamil nadu, India 1 Assistant Professor, Department
Cracking Salted Hashes
Overview: Cracking Salted Hashes Web Application Security: - The Do s and Don ts of Salt Cryptography Data Base security has become more critical as Databases have become more open. And Encryption which
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
Public Key Encryption that Allows PIR Queries
Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E Skeith III Appeared at CRYPTO 2007: 50-67 Abstract Consider the following problem: Alice wishes to maintain
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
Karsten Nohl, [email protected]. Breaking GSM phone privacy
arsten Nohl, [email protected] Breaking GSM phone privacy GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987
Public Key Encryption with keyword Search
Public Key Encryption with keyword Search Dan Boneh Stanford University Giovanni Di Crescenzo Telcordia Rafail Ostrovsky Giuseppe Persiano UCLA Università di Salerno Abstract We study the problem of searching
OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools.
Network security MSc IDL (GLIA) and MSc HIT / Isima Academic year 2012-2013 OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. 1. OpenSSL usage Exercice 1.1
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates
CS 600.443 Final Exam
CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page
Public Key Encryption with keyword Search
Public Key Encryption with keyword Search Dan Boneh Stanford University Giovanni Di Crescenzo Telcordia Rafail Ostrovsky Giuseppe Persiano UCLA Università di Salerno Abstract We study the problem of searching
SWFP: Secure Web Feed Protocol
SWFP: Secure Web Feed Protocol Frédérick Giasson fred [at] fgiasson.com Abstract SWFP ensures the secure broadcasting of web feeds content over a local network or the Internet. The protocol is built to
Privacy and Security in Cloud Computing
Réunion CAPPRIS 21 mars 2013 Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧnen Slide 1 Cloud computing Idea: Outsourcing Ø Huge distributed data centers Ø Offer storage and computation Benefit:
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation
Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
CLoud Computing is the long dreamed vision of
1 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Cong Wang, Student Member, IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Wenjing Lou, Senior Member,
Lecture 17: Re-encryption
600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Proofs in Cryptography
Proofs in Cryptography Ananth Raghunathan Abstract We give a brief overview of proofs in cryptography at a beginners level. We briefly cover a general way to look at proofs in cryptography and briefly
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
Digital Signatures. Prof. Zeph Grunschlag
Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Private Searching On Streaming Data
Journal of Cryptology, Volume 20:4, pp. 397-430, October 2007. 1 Private Searching On Streaming Data Rafail Ostrovsky William E. Skeith III Abstract In this paper, we consider the problem of private searching
CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING
CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING Gómez J., Montoya F.G., Benedicto R., Jimenez A., Gil C. and Alcayde A. University of Almeria, Spain {jgomez, pagilm, rbenedicto, ajimenez,
Trusted-computing (TC) initiatives potentially
Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
CS3235 - Computer Security Third topic: Crypto Support Sys
Systems used with cryptography CS3235 - Computer Security Third topic: Crypto Support Systems National University of Singapore School of Computing (Some slides drawn from Lawrie Brown s, with permission)
A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ
I.J. Wireless and Microwave Technologies 2012, 4, 21-27 Published Online August 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012. 04.04 Available online at http://www.mecs-press.net/ ijwmt
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Why Should You Care About Security Issues? SySmox WEB security [email protected]. Top seven ColdFusion Security Issues
SySmox WEB security [email protected] Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.
Project: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
Likelihood: Frequentist vs Bayesian Reasoning
"PRINCIPLES OF PHYLOGENETICS: ECOLOGY AND EVOLUTION" Integrative Biology 200B University of California, Berkeley Spring 2009 N Hallinan Likelihood: Frequentist vs Bayesian Reasoning Stochastic odels and
Advanced Security Issues in Wireless Networks
Advanced Security Issues in Wireless Networks Seminar aus Netzwerke und Sicherheit Security Considerations in Interconnected Networks Alexander Krenhuber Andreas Niederschick 9. Januar 2009 Advanced Security
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
1 Sufficient statistics
1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
The Heston Model. Hui Gong, UCL http://www.homepages.ucl.ac.uk/ ucahgon/ May 6, 2014
Hui Gong, UCL http://www.homepages.ucl.ac.uk/ ucahgon/ May 6, 2014 Generalized SV models Vanilla Call Option via Heston Itô s lemma for variance process Euler-Maruyama scheme Implement in Excel&VBA 1.
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
How To Teach A Cyber Security Course
AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates
Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite.
ainbow Cracking: Do you need to fear the ainbow? Philippe Oechslin, Objectif Sécurité 1 On the menu 1. ainbow tables explained 2. Who is vulnerable 3. Tools and history 4. What you should do about it 2
Fundamentals of Computer Security
Fundamentals of Computer Security Spring 2015 Radu Sion Intro Encryption Hash Functions A Message From Our Sponsors Fundamentals System/Network Security, crypto How do things work Why How to design secure
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin [email protected] Columbia University William R. Cheswick [email protected] AT&T Technical Report CUCS-034-07 Abstract It is
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
A programming model in Cloud: MapReduce
A programming model in Cloud: MapReduce Programming model and implementation developed by Google for processing large data sets Users specify a map function to generate a set of intermediate key/value
Efficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
Cryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
