An Oblivious Password Cracking Server

Size: px
Start display at page:

Download "An Oblivious Password Cracking Server"

Transcription

1 An Oblivious Password Cracking Server Aureliano Calvo - [email protected] Ariel Futoransky - [email protected] Carlos Sarraute - [email protected] Corelabs Core Security Technologies An Oblivious Password Cracking Server / 26

2 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

3 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26

4 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26

5 Intro Reversing cryptographically-strong hashes is really resource intensive. What if a resource constrained hacker wants to crack a password? Hash reversing tables to the rescue! An Oblivious Password Cracking Server / 26

6 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26

7 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26

8 Space-Time trade-off Rainbow tables allow to use O(N 2/3 ) space and O(N 2/3 ) time to invert a hash where N is the size of the pre-image. For instance a rainbow table used to break LM takes 34GBytes. What if the password cracker cannot store the tables? An Oblivious Password Cracking Server / 26

9 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26

10 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26

11 Privacy implications A server serves the tables. But... Now the server can know the passwords being cracked :(. An Oblivious Password Cracking Server / 26

12 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

13 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

14 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26

15 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26

16 Hellman Tables Store initial password and ending hash for each chain (length M). Each table stores M chains. M tables. Each one uses its own reduction function. An Oblivious Password Cracking Server / 26

17 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26

18 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26

19 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26

20 Hellman Tables with Distinguished End-Points Differences with Hellman Tables End-points have a property that distinguishes them Such as number of leading 0s The expected length of chains is M. Minimizes number of queries made to the tables (just M). An Oblivious Password Cracking Server / 26

21 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26

22 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26

23 Rainbow Tables Just one table with M 2 entries. Collisions are avoided by using a different reduction function for each step. This is the most popular kind of hash reversing tables. An Oblivious Password Cracking Server / 26

24 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

25 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

26 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

27 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

28 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

29 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

30 Table sizes Number of chains = M 2 M chains for each of the M tables for Hellman Tables and Hellman Tables With Distinguished Endpoints. Chain length = M Average chain length for Hellman Tables With Distinguished Endpoints. M = 3 ln(1 α) N where: N is the size of the preimage α is the probability that a preimage can be found using the table. An Oblivious Password Cracking Server / 26

31 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

32 Problem to be solved Ask for a bit in a database stored by a server without revealing the requested bit to the server. Without sending the entire database (!). An Oblivious Password Cracking Server / 26

33 Problem to be solved Ask for a bit in a database stored by a server without revealing the requested bit to the server. Without sending the entire database (!). An Oblivious Password Cracking Server / 26

34 Problem to be solved "Something being imposible does not imply that it has never been done" (Fernando Russ) An Oblivious Password Cracking Server / 26

35 Classic PIR Eyal Kushilevitz and Rafail Ostrovsky Replication is not needed: Single database, computationally-private information retrieval. Proceedings of the 38th Annu. IEEE Symp. on Foudations of Computer Science, pages: , An Oblivious Password Cracking Server / 26

36 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26

37 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26

38 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26

39 Classic PIR - Complexities Server processing complexity: O(n). Client processing complexity: O( n). Transfer complexity: O( n). Where n is the number of bits in the database. An Oblivious Password Cracking Server / 26

40 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

41 Our Work Hellman Tables With Distinguished Endpoints as Hash-Reversing Tables queried using Classic PIR. An Oblivious Password Cracking Server / 26

42 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26

43 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26

44 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26

45 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26

46 Calculating the tables (begin, end) pairs are stored in a closed hash table. The size of each table is βm, where β > 1. Each entry has an index, representing the initial plain-text, and the end-of-chain hash. The key of the entry is the end-of-chain hash. Hash-Table Collisions are discarded when the tables are generated. An Oblivious Password Cracking Server / 26

47 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26

48 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26

49 Reversing a Hash The client calculates the M ends-of-chain for the hash being reversed. One for each table. It requests the corresponding server buckets, via M PIR requests. For each response, it checks if the end-of-chain is the one needed. If so, it navigates the chain looking for the preimage of the hash being reversed. An Oblivious Password Cracking Server / 26

50 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26

51 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26

52 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26

53 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26

54 Complexity Single hash-reversing client processing complexity: O(M 2 ). Single hash-reversing server processing complexity: O(M 2 ). Transfer complexity: O(M 3/2 ). Server storage complexity: O(M 2 ). Table calculation complexity: O(M 3 ). An Oblivious Password Cracking Server / 26

55 Experimental Results An Oblivious Password Cracking Server / 26

56 Agenda 1 Intro And Motivation 2 Standing On The Shoulders of Giants Hash-Reversing Tables Private Information Retrieval 3 Our Work 4 Future Work An Oblivious Password Cracking Server / 26

57 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26

58 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26

59 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26

60 Future Work Optimize using other PIR schemes Paralelize cracking Devise a way to use the current rainbow tables with a PIR scheme Use PIR to reverse hashes in the client while the server brute forces it (no tables stored). An Oblivious Password Cracking Server / 26

61 Any Question? An Oblivious Password Cracking Server / 26

62 Thank you! An Oblivious Password Cracking Server / 26

Cracking Passwords With Time-memory Trade-offs. Gildas Avoine Université catholique de Louvain, Belgium

Cracking Passwords With Time-memory Trade-offs. Gildas Avoine Université catholique de Louvain, Belgium Cracking Passwords With Time-memory Trade-offs Gildas Avoine Université catholique de Louvain, Belgium SUMMARY Motivations Hellman Tables Oechslin Tables Real Life Examples Fingerprint Tables Conclusion

More information

NETWORK SECURITY: How do servers store passwords?

NETWORK SECURITY: How do servers store passwords? NETWORK SECURITY: How do servers store passwords? Servers avoid storing the passwords in plaintext on their servers to avoid possible intruders to gain all their users passwords. A hash of each password

More information

A novel time-memory trade-off method for password recovery

A novel time-memory trade-off method for password recovery available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin A novel time-memory trade-off method for password recovery Vrizlynn L.L. Thing*, Hwei-Ming Ying Institute for Infocomm

More information

Authentication in WLAN

Authentication in WLAN Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Attacking NTLM with Precomputed Hashtables

Attacking NTLM with Precomputed Hashtables Attacking NTLM with Precomputed Hashtables warlord [email protected] Contents 1 Introduction 2 2 The design of LM and NTLM 3 2.1 The LanMan disaster......................... 3 2.2 NTLM.................................

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Query Services in Cost Efficient Cloud Using Query Analysis

Query Services in Cost Efficient Cloud Using Query Analysis Query Services in Cost Efficient Cloud Using Query Analysis VanthanaPriya.J 1, ArunKumar.B 2 PG Scholar, Department of CSE, Karpagam University, Coimbatore, Tamil nadu, India 1 Assistant Professor, Department

More information

Cracking Salted Hashes

Cracking Salted Hashes Overview: Cracking Salted Hashes Web Application Security: - The Do s and Don ts of Salt Cryptography Data Base security has become more critical as Databases have become more open. And Encryption which

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

Public Key Encryption that Allows PIR Queries

Public Key Encryption that Allows PIR Queries Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E Skeith III Appeared at CRYPTO 2007: 50-67 Abstract Consider the following problem: Alice wishes to maintain

More information

IronKey Data Encryption Methods

IronKey Data Encryption Methods IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Hash Functions. Integrity checks

Hash Functions. Integrity checks Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify

More information

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs

More information

CIS433/533 - Computer and Network Security Cryptography

CIS433/533 - Computer and Network Security Cryptography CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and

More information

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptographic Hash Functions Message Authentication Digital Signatures Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption

More information

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies

More information

Karsten Nohl, [email protected]. Breaking GSM phone privacy

Karsten Nohl, karsten@srlabs.de. Breaking GSM phone privacy arsten Nohl, [email protected] Breaking GSM phone privacy GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987

More information

Public Key Encryption with keyword Search

Public Key Encryption with keyword Search Public Key Encryption with keyword Search Dan Boneh Stanford University Giovanni Di Crescenzo Telcordia Rafail Ostrovsky Giuseppe Persiano UCLA Università di Salerno Abstract We study the problem of searching

More information

OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools.

OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. Network security MSc IDL (GLIA) and MSc HIT / Isima Academic year 2012-2013 OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. 1. OpenSSL usage Exercice 1.1

More information

Attack Frameworks and Tools

Attack Frameworks and Tools Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION

AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates

More information

CS 600.443 Final Exam

CS 600.443 Final Exam CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page

More information

Public Key Encryption with keyword Search

Public Key Encryption with keyword Search Public Key Encryption with keyword Search Dan Boneh Stanford University Giovanni Di Crescenzo Telcordia Rafail Ostrovsky Giuseppe Persiano UCLA Università di Salerno Abstract We study the problem of searching

More information

SWFP: Secure Web Feed Protocol

SWFP: Secure Web Feed Protocol SWFP: Secure Web Feed Protocol Frédérick Giasson fred [at] fgiasson.com Abstract SWFP ensures the secure broadcasting of web feeds content over a local network or the Internet. The protocol is built to

More information

Privacy and Security in Cloud Computing

Privacy and Security in Cloud Computing Réunion CAPPRIS 21 mars 2013 Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧnen Slide 1 Cloud computing Idea: Outsourcing Ø Huge distributed data centers Ø Offer storage and computation Benefit:

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic

More information

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Roşu and Michael Steiner Rutgers

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

CLoud Computing is the long dreamed vision of

CLoud Computing is the long dreamed vision of 1 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Cong Wang, Student Member, IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Wenjing Lou, Senior Member,

More information

Lecture 17: Re-encryption

Lecture 17: Re-encryption 600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy

More information

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz University of California, Berkeley The Problem

More information

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document? Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Proofs in Cryptography

Proofs in Cryptography Proofs in Cryptography Ananth Raghunathan Abstract We give a brief overview of proofs in cryptography at a beginners level. We briefly cover a general way to look at proofs in cryptography and briefly

More information

Cryptography and Network Security Chapter 12

Cryptography and Network Security Chapter 12 Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Threat Modeling Cloud Applications

Threat Modeling Cloud Applications Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

Penetration: from Application down to OS

Penetration: from Application down to OS April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.

More information

Digital Signatures. Prof. Zeph Grunschlag

Digital Signatures. Prof. Zeph Grunschlag Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Private Searching On Streaming Data

Private Searching On Streaming Data Journal of Cryptology, Volume 20:4, pp. 397-430, October 2007. 1 Private Searching On Streaming Data Rafail Ostrovsky William E. Skeith III Abstract In this paper, we consider the problem of private searching

More information

CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING

CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING Gómez J., Montoya F.G., Benedicto R., Jimenez A., Gil C. and Alcayde A. University of Almeria, Spain {jgomez, pagilm, rbenedicto, ajimenez,

More information

Trusted-computing (TC) initiatives potentially

Trusted-computing (TC) initiatives potentially Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large organizations putting physically secure hardware on user machines, potentially

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]

More information

CS3235 - Computer Security Third topic: Crypto Support Sys

CS3235 - Computer Security Third topic: Crypto Support Sys Systems used with cryptography CS3235 - Computer Security Third topic: Crypto Support Systems National University of Singapore School of Computing (Some slides drawn from Lawrie Brown s, with permission)

More information

A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ I.J. Wireless and Microwave Technologies 2012, 4, 21-27 Published Online August 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012. 04.04 Available online at http://www.mecs-press.net/ ijwmt

More information

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

More information

Why Should You Care About Security Issues? SySmox WEB security [email protected]. Top seven ColdFusion Security Issues

Why Should You Care About Security Issues? SySmox WEB security Info@sysmox.com. Top seven ColdFusion Security Issues SySmox WEB security [email protected] Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.

More information

Project: Simulated Encrypted File System (SEFS)

Project: Simulated Encrypted File System (SEFS) Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,

More information

Likelihood: Frequentist vs Bayesian Reasoning

Likelihood: Frequentist vs Bayesian Reasoning "PRINCIPLES OF PHYLOGENETICS: ECOLOGY AND EVOLUTION" Integrative Biology 200B University of California, Berkeley Spring 2009 N Hallinan Likelihood: Frequentist vs Bayesian Reasoning Stochastic odels and

More information

Advanced Security Issues in Wireless Networks

Advanced Security Issues in Wireless Networks Advanced Security Issues in Wireless Networks Seminar aus Netzwerke und Sicherheit Security Considerations in Interconnected Networks Alexander Krenhuber Andreas Niederschick 9. Januar 2009 Advanced Security

More information

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main

More information

1 Sufficient statistics

1 Sufficient statistics 1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =

More information

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

More information

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We

More information

The Heston Model. Hui Gong, UCL http://www.homepages.ucl.ac.uk/ ucahgon/ May 6, 2014

The Heston Model. Hui Gong, UCL http://www.homepages.ucl.ac.uk/ ucahgon/ May 6, 2014 Hui Gong, UCL http://www.homepages.ucl.ac.uk/ ucahgon/ May 6, 2014 Generalized SV models Vanilla Call Option via Heston Itô s lemma for variance process Euler-Maruyama scheme Implement in Excel&VBA 1.

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru

More information

How To Teach A Cyber Security Course

How To Teach A Cyber Security Course AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION Tom Chothia Chris Novakovic University of Birmingham Introduction A VM to support cyber security education. The VM creates

More information

Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite.

Rainbow Cracking: Do you need to fear the Rainbow? Philippe Oechslin, Objectif Sécurité. OS Objectif Sécurité SA, Gland, www.objectif-securite. ainbow Cracking: Do you need to fear the ainbow? Philippe Oechslin, Objectif Sécurité 1 On the menu 1. ainbow tables explained 2. Who is vulnerable 3. Tools and history 4. What you should do about it 2

More information

Fundamentals of Computer Security

Fundamentals of Computer Security Fundamentals of Computer Security Spring 2015 Radu Sion Intro Encryption Hash Functions A Message From Our Sponsors Fundamentals System/Network Security, crypto How do things work Why How to design secure

More information

Merkle Hash Trees for Distributed Audit Logs

Merkle Hash Trees for Distributed Audit Logs Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

Privacy-Enhanced Searches Using Encrypted Bloom Filters

Privacy-Enhanced Searches Using Encrypted Bloom Filters Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin [email protected] Columbia University William R. Cheswick [email protected] AT&T Technical Report CUCS-034-07 Abstract It is

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India 3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human

More information

A programming model in Cloud: MapReduce

A programming model in Cloud: MapReduce A programming model in Cloud: MapReduce Programming model and implementation developed by Google for processing large data sets Users specify a map function to generate a set of intermediate key/value

More information

Efficient Similarity Search over Encrypted Data

Efficient Similarity Search over Encrypted Data UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information