OpenSSL User Manual and Data Format. Vittorio Giovara
|
|
|
- Barrie McBride
- 9 years ago
- Views:
Transcription
1 OpenSSL User Manual and Data Format Vittorio Giovara December 20, 2007
2 Chapter 1 Introduction to OpenSSL 1.1 What is OpenSSL OpenSSL is an open source implementation of the SSL and TSL protocol for secure communication, providing many cryptographic operations like encryption and decryption of data, digest creation and verification, public and private key pairs computation and certificate handling. This program is available for almost any operating systems and its own API functions are available for developing secure applications. Since version it supports external crypto hardware engines for enhancing performance of cryptographic algorithms. 1.2 Main Functions This document focuses mainly on digest and symmetric encryption topics, but it first gives a brief overview on other fuctions of the OpenSSL program. benchmark reports some performance data for every cypher algorithm or for a selected one; certificates provides creation of self-signed (and CA-signed) X509 certificates and consequent verification; digest enalbes data integrity for files; public and private keys performs private and public key pair generator using RSA, DSA and elliptic curve algorithms; digital signature autheticates formally the author of the data; symmetric encryption provides fast and secure encryption method; prime numbers checks if a given number is prime; random data outputs random values to a file. 1.3 Assumptions In this document is also presented command syntax and format for certain options. To avoid confusion or ambiguities the following assumptions will be valid through all the document. the italics commands represent optional parameters; the [square brackets] inform of the presence of different options; the standard format indicates mandatory arguments. 1
3 Chapter 2 Digest A digest is a fingerprint of a file which needs integrity protection. Usually digests are computed with hash functions, as they must be very fast to compute, nearly impossible to invert and have little probability of creating collisions. Digest algorithms perform independently on the data, always producing a fixed-length result. There are many hash functions available, but most of them are obsolete or unsecure. For instance, MD2 and MD4 should be avoided completely, while MD5 and SHA1 are generally suited for general purpose operations (like checking files downloaded from internet); for high-security applications however only SHA-224 to SHA- 256 should be used. 2.1 Syntax In order to create a digest, the user must use the dgst command of OpenSSL followed by some parameters. The sintax of the command follows: $ openssl dgst [hash function] [display options] -out file.dgst file.input hash function is the name of the hash function which the file is computed with. Default algorithm is MD5, but SHA1 and other high-security hashes are also present; in order to know the available algorithms installed it is possible to run this command: $ openssl list-message-digest-commands display options formats the output in different ways: -hex outputs an hexadecimal string (default); -c splits the hexadecimal string in groups of two digist separated by colons; -binary encodes the output in binary form (disabling -c option). -out file.dgst is the destination file where to store the digest. Default is standard output; file.input is the file to compute the digest on. Default is standard input. 2.2 File Format The output file is a clear text file in which is clearly stated the hash function used the original file name the actual digest string 2
4 The file is formatted in this form: hash function(filename)= digest string If the file was output in the binary format, the file is no more a text file and is readable only through a hexeditor. In this case only the digest string is actually stored into the file, obviously encoded in binary format. 2.3 Digest Creation As said before, OpenSSL offers many digest hash functions, in particular MD5, SHA1 (and its high-security evolutions) and RIPEMD160, for creating robust digest files. To create a digest, it is sufficient to select the hash functions, the input file (where there is the data to protect) and optionally the output file (where the digest will be stored). For example, if we wanted to compute the digest of the file file.txt with the MD5 hash function and see the result to screen, we should invoke this command: $ openssl dgst -md5 file.txt MD5(file.txt)= d41d8cd98f00b204e ecf8427e It is possible to modify the ouput with options -c, -hex, -binary and see debug messages regarding I/O operations with -d. For example, if we wanted to compute the digest of the file file.txt with the SHA1 hash function and see the result into file.sha1 column separated, we should invoke the following command and print the result to screen (for example with cat): $ openssl dgst -sha1 -c -out file.sha1 file.txt $ cat file.sha1 SHA1(file.txt)= da:39:a3:ee:5e:6b:4b:0d:[ ]:60:18:90:af:d8:07: Digest Verification Since digest hashes are fixed-length operations, it is quick and easy to generate a new digest even for very large quantity of data. So digest verification is done simply by comparison, confronting the received digest and the one recomputed form the correspoding received file. A very simple sequence of shell commands like the following can perform this operation: $ openssl dgst -md5 file.txt cmp file.md5 If no output is displayed, it means that the file has not been modified. 2.5 Digital Signature Digests are commonly used for providing integrity for transmitted files, but they also offer authentication and non repudiation properties for any kind of data through digital signature. A digest encrypted with the private key of the author of the related file is the very equivalent of the digital signature of the file; others can verify the digest of the file using the public key of the author. For a short introduction about how to generate private and public keys used in examples below with OpenSSL, please refer to appendix A Advanced Syntax When dealing with digital signature, OpenSSL offers more specific options for signing and verifying digests. Clearly format options are no loger present, as the output is encrypted and not viewable; moreover the sintax differs for signing and verification process. So the sintax becomes respectively: 3
5 $ openssl dgst [hash function] -sign private.key -out file.sign file.input $ openssl dgst [hash function] -verify public.key -signature file.sign file.input hash function is, as above, the name of the algorithm for computing the digest. Default is always MD5: -sign private.key encodes the digest computed from the input file with the private key of the author; -verify public.key decodes the signature with the public key and compares the output digest it with the one obtained from the input file; -signature file.sign is the source for verifiy the digital signature of the input file; -out file.sign is the destination file where to store the signature of the input file. Default is standard output; file.input is the file to digitally sign or to verify Signing a digest with a private key For better comprehension, an example is provided. Let s consider that we need to digitally sign the file called file.txt with the key contained in private.key; OpenSSL allows creation of signed digests with this command: $ openssl dgst -sha1 -sign private.key -out file.sign file.txt The digest file created is a binary file unreadable if the public key is not available Checking a digest with a public key So if we want to verify the file file.txt with its signature (file.sign), we need the related public key (public.key) and file in the same form of the original form of when the digest was computed (that is, if the digest was computed on an encrypted file, it must be validated on the encrypted file, not on the decrypted one). We can then run the following program and see the result: $ openssl dgst -sha1 -verify public.key -signature file.sign file.txt Verified OK The output can only be Verified OK or Verification Failure as no other info is either necessary or available. 4
6 Chapter 3 Symmetric Encryption Even though symmetric encryption lacks of many security properties like integrity (which is provided by digests) or authentication (which is privided by digital signature), it is very quick and requires very low computational power and thus it is suited for dealing with large quantity of data. 3.1 Available Ciphers OpenSSL allows symmetric encryption of data through a number of ciphers and their variants. To obtain the list of available ciphers installed (they may vary according to compilation parameters), we can run this command: $ openssl list-cipher-commands The common name format for these ciphers is: name is the base name of the algorithm; name-keylength-blockoption keylength is the length of the key used in the algorithm; blockoption is how block algorithms behave when they are applied to data quantity different from the algorithm block size. The latter two attributes are not always present, as it is possible to encode with the base algorithm; the presence of the keylength doesn t depend on the presence of the blockoption and viceversa. Only for the AES cipher all the attributes are always specified. 3.2 Syntax For encryption operations the enc command of OpenSSL is used. Almost all the arguments require one option either passed to command line or read from file. The general syntax is: $ openssl enc [operation] [cipher] -in file.input -out file.enc [key field] [salt field] [minor options] operation switches between encoding (-e) and decoding (-d) operation. The default function selected is encoding; cipher selects the cipher to use for encryption. If none is chosen the program exits with no error messages; -in file.input is the file to encode. Default is standard input; -out file.enc is the result of the encryption. Default is standard output; 5
7 When hexadecimal strings are required in any parameter, if the length of the string is too short, the string is filled up with 0s up to the correct length which varies according to the type of argument and type of cipher (shown in figure 3.4); on the other hand if the length of string is twice as long as the nominal default string length or more, the string is rejected and the program exits, while if it is less, then the string is just truncated to the correct length. This was discovered by pratical tests performed during the writing of this document Key Field Every symmetric algorithm requires a key for processing data; in OpenSSL this value can be either derived from a password (prompted at the user) or passed via command line. Key derivation is performed by the EVP BytesToKey() function included in openssl/evp.c. Key and Initial Vector are derived from the salt (see 3.2.2) and passphrase. Basic Options -k password skips password prompting and uses the password argument for key derivation. Beware that this operation is highly unsecure as the password is printed in cleartext and can be sniffed or fetched from the bash history or other Unix utilities. -kfile password.file reads the password from the first line of the file password.file. Slightly more secure than above as no information is printed in cleartext; -K key selects the actual key to use and avoids key derivation; it must be a hexadecimal string. If this option is selected, also the Initial Vector must be specified, unless a password is provided that is used for iv derivation. Passphrase Option Both -k and -kfile commands are mantained for compatibility issues among different versions of OpenSSL and they are now superseded by the -pass argument (called Passphase command) which collects and improves these functionalities. This command has its own argument format of this kind: operation:parameter Having said tht, the options for the -pass argument are: pass:password receives password from command line (has the same drawbacks of the -k option); env:var uses an environment varible as a password for key derivation; file:path reads the password from a file (exactly like the -kfile option); fd:number reads the password from a file descriptor (used in network and pipe lines); stdin prompts the password from standard input. Other options There are two final parameters that are involved in key derivation: -iv initialvector species the intilial vector used in block algorithms to avoid known-plaintext attacks; it must be an hexadecimal string. It is mandatory when -K option is specified, unless a password is also provided. In that case the key is actually used as main key for the cipher, while the password is used for initial vector derivation. If it is used in combination with a stream algorithm (like RC4), this parameter is ignored; -md hash selects the message digest used for key derivation; MD5 and SHA1 are both available. This is an undocumented feature of OpenSSL. 6
8 3.2.2 Salt Field This is an important feature of OpenSSL: with this option the file encrypted is salted in sense that the key generation process is randomized with high entropy values. It is very important to include this parameter always as it drammatically enhances security against bruteforce and dictionary attacks: every bit of salt doubles the storage amount and computational power required for this kind of attacks. Since salt is used for derivation of both the key and the initial vector, in order to avoid an inconsistent command, when the -K and -iv arguments are defined, the salt option is completely ignored and salt is initialized with random values. The salt has a fixed length 8 bytes and it is included in the encrypted file, preceeded by the special string Salted (8 bytes), making the file 16 bytes bigger than the non-salted version. There are basically three kind of salt commands: -salt enables salt insertion on the key generation process; -S salt specifies the actual salt to use rather than letting OpenSSL derive it from the password; the argument salt can only be a hexadecimal string; -nosalt used only for compatibility issues, it disables the production of the salt. Very unsecure as non-salted data is often easy victim of dictionary attacks Minor Options There are some final possibile commands that selects other encryption details: -base64 encodes the file in base64 format after encoding; useful for sending data on channels where the seventh bit may be cut off: -nopad disables standard padding techinque In this case the input data must be a multiple of the cipher block length, otherwise it will be not possible to decrypt the file correctly; -p prints to screen the salt, the key and the initial vector used by the cipher in hexadecimal form; -P runs the command in pretend mode, no files are written, only the salt, key and initial vector are displayed in hexadecimal form; -buffer size defines the buffer size for I/O operations; -debug shows debug information for I/O operations (eg. open file etc.). 3.3 Encoding Examples With OpenSSL it is possible to use the cryptographic algorithms of above to perform encryption of data. If we want to encrypt the file file.txt via the Advanced Encryption Standard with 192 bits long key and Electronic Code Block, we need to run this command: $ openssl enc -aes-192-ecb -in file.txt -out file.enc enter aes-192-ecb encryption password: A more advanced approach example could be this one: if we want to encode the file file.txt through Triple DES with Cipher Block Chaining passing the key from the file key.txt (stored in the same directory) and skip salt insertion we would call: $ openssl enc -des-ede3-cfb -nosalt -in file.txt -pass file:key.txt -out file.enc An even more detailed encryption metod can be this: if we want to encode and send via the file file.txt with standard IDEA, using key 12576A1 and initial vector and see the details on screen, we would run: 7
9 $ openssl enc -idea -base64 -in file.txt -out file.enc -K 12576A1 -iv 89B46D512 -p salt= cac10b00 key=12576a iv =89B46D Decoding In order to decode a ciphered file we need to know all the encoding details that were selected during the encryption process. Otherwise the encoded file is processed with wrong parameters and the output file is just an unreadable binary file. The following details are required: the cipher used; the password or the key plus the initial vector; if the file was salted (and the salt string if no key was provided); the format (eg. encoded with -base64) and the padding. Then we can call the OpenSSL program enc with the -d option, select the encoded file as inupt and choose an output. Let s suppose we want to decode the file file.enc created in the last example of 3.3; we would run $ openss enc -d -idea - base64 -in file.enc -out file.dec -K 12576A1 -iv 89B46D512 If just one parameter is set wrong, the whole decoding procedure fails even if there is no error message and a file is createted nevertheless. That is correct because OpenSSL decoding feature blindly processes the byte stream of the encoded file, applying mathematical algorithms with given parameters and it cannot detected if they are wrong. In conclusion, the only way for correctly decoding a file is by knowing all the encoding details from the very beginning. 3.5 File Format The output file contains the data of the original file encoded according to the algorithm used. Obviously no decrypting information is stored in the file, not even in encrypted form, as it may result in a decrease in the security level. The only information contained in the file, besides encrypted data, is the salt value. When the file is salted the file contains a special string of 8 bytes followed by the salt value itself (8 bytes) for a total of 16 bytes; then the encoded data is appended to the file. So in a salted file we would read: Salted saltvalue data This operation is useful because the salt value is used derive the key and initial vector in the decoding process. One final note about the output file size. As long as the size is a multiple of algorithm block size, the dimension of the encrypted file corresponds to the original unencrypted file; if it is not, all block algorithms add one final byte to the encoded file for parllelism with the data block size (that is, every block has the same dimesion) as shown in figure Example Here is an example to witness what has been stated before. The text file file.txt was encoded with Triple Des three times, first without salt, then with salt enabled and finally with the salt string passed via command line. 8
10 Figure 3.1: This is the text file used in this example Figure 3.2: This is the encrypted file with no salt; the dimension of the file has grown of 4 bytes, because of the premises expained in 3.5 9
11 Figure 3.3: This is the encrypted file with salt; the file has grown of 16 bytes, because of the premises expained in and 3.5 Figure 3.4: This is the encrypted file with salt passed from command line. The string value was , was filled up with 0s to create a string of 16 digits (8 bytes) (as in 3.2), and it is visible next the Salted string (as in and 3.5) 10
12 Appendix A Key generation OpenSSL allows creation of private and public key pairs with the command genrsa.and rsa. In this short appendix only the practical commands for generating the key pair will be showed. To create a private key of 1024 bits long using the RSA algorithm, we can use this command: $ openssl genrsa -out private.key 1024 Generating RSA private key, 1024 bit long modulus It is also possible to encrypt the private key with DES, DES3 or IDEA algorithms before outputting it. In this way any operation involving the private key will always require a password before proceding, while leaving public key operations unaffected. For example if we wanted to cypher the 1024 RSA key of before with a DES3 alogorithm, we would need to enter a password (a key for the symmetric algorithm) before obtaining the key: $ openssl genrsa -des3 -out private.key.enc 1024 Enter passphrase for private.key.enc: Verifying - Enter pass phrase for private.key.enc: For public key generation we just need the private key first and then we can run this command: $ openssl rsa -in private.key -out public.key -pubout writing RSA key In conclusion we have created two files, one for the private key (file private.key) and one for the public key (file public.key). 11
13 Contents 1 Introduction to OpenSSL What is OpenSSL Main Functions Assumptions Digest Syntax File Format Digest Creation Digest Verification Digital Signature Advanced Syntax Signing a digest with a private key Checking a digest with a public key Symmetric Encryption Available Ciphers Syntax Key Field Salt Field Minor Options Encoding Examples Decoding File Format Example A Key generation 11 12
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools.
Network security MSc IDL (GLIA) and MSc HIT / Isima Academic year 2012-2013 OpenSSL (lab notes) Definition: OpenSSL is an open-source library containing cryptographic tools. 1. OpenSSL usage Exercice 1.1
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Crypto Lab Public-Key Cryptography and PKI
SEED Labs 1 Crypto Lab Public-Key Cryptography and PKI Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US National Science
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
Project #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1. 1. Explain any six benefits of Software as Service in Cloud computing?
NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1 1. Explain any six benefits of Software as Service in Cloud computing? 2. List the different cloud applications available in the
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
WS_FTP Professional 12
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method...1 About SSL...1 About SSH...2 About OpenPGP...2 Using FIPS 140-2 Validated Cryptography...2
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 1 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE FENG Ziliang*, PAN Weijun* / ** 1, WANG Yang* * Institute of Image and
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Apache, SSL and Digital Signatures Using FreeBSD
Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
Encrypted Connections
EMu Documentation Encrypted Connections Document Version 1 EMu Version 4.0.03 www.kesoftware.com 2010 KE Software. All rights reserved. Contents SECTION 1 Encrypted Connections 1 How it works 2 Requirements
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
A Mechanism for VHDL Source Protection
A Mechanism for VHDL Source Protection 1 Overview The intent of this specification is to define the VHDL source protection mechanism. It defines the rules to encrypt the VHDL source. It also defines the
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Learning Network Security with SSL The OpenSSL Way
Learning Network Security with SSL The OpenSSL Way Shalendra Chhabra [email protected]. Computer Science and Enginering University of California, Riverside http://www.cs.ucr.edu/ schhabra Slides Available
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Implementing SSL Security on a PowerExchange 9.1.0 Network
Implementing SSL Security on a PowerExchange 9.1.0 Network 2012 Informatica Abstract This article describes how to implement SSL security on a PowerExchange network. To implement SSL security, configure
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Creating and Managing Certificates for My webmethods Server. Version 8.2 and Later
Creating and Managing Certificates for My webmethods Server Version 8.2 and Later November 2011 Contents Introduction...4 Scope... 4 Assumptions... 4 Terminology... 4 File Formats... 5 Truststore Formats...
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
Apple Cryptographic Service Provider Functional Specification
Apple Cryptographic Service Provider Functional Specification apple 2005-03-10 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
KeyStone Architecture Security Accelerator (SA) User Guide
KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
, ) I Transport Layer Security
Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent
HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
AD Image Encryption. Format Version 1.2
AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
