A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE
|
|
|
- Scot Norris
- 9 years ago
- Views:
Transcription
1 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE FENG Ziliang*, PAN Weijun* / ** 1, WANG Yang* * Institute of Image and Graphics, Sichuan Univ. ** Air Traffic Management College, Civil Aviation Flight Univ. of China Keywords: ADS-B, Data Authentication, ECC, X.509 Abstract A solution of data authentication of ADS-B systems based on the ECC and X.509 certificate is proposed in this paper. It can avoid key distribution problems combined with the symmetric key algorithm and prevent the ADS-B data spoofing thoroughly. Experimental test results showed that the solution is valid and appropriate in ADS-B UAT mode. 1 General Introduction A major characteristic of Automatic Dependent Surveillance - Broadcast (ADS-B) technology is to broadcast the sender s location data periodically. It leads to several severe security problems respectively, such as data spoofing which has not been solved perfectly. A solution to the problem of data authentication of ADS-B systems based on the ECC and X.509 certificate is proposed in this paper, which may avoid the key distribution problems combined with the symmetric key algorithm, preventing ADS-B data spoofing thoroughly. 2 A Proposed Solution of ADS-B Data Authentication There are two possible approaches to attacking ADS-B systems by data spoofing. One is to manipulate reasonable ADS-B data, which is valid in format and to send it in time. Another is recording legal ADS-B signals or data in advance and to resend them at some specified time, which is also named data replay attack. The aims of both are intended to disorder the display of ground and airborne ADS-B equipment, or to confuse the command of the air traffic controller. ADS-B data spoofing is a severe potential threaten to the safety of air traffic [1] and considered as the most serious obstacle for the popularization of ADS-B. The potential and possible approaches against ADS-B data spoofing may be cryptography techniques. However, there are several difficulties that should be overcome although modern cryptography techniques have been proved very safe and are used very widely. The most important problem is how to choose appropriate cryptography techniques. In a symmetrical cryptography system, the key of sender and receiver must be symmetrical or be the same [2]. The obvious difficulty of using in ADS-B is the distribution and management of the symmetrical keys, because the ADS-B system is not a well-connected network and the keys cannot be well distributed in real time, which limits the use of symmetrical cryptography. In a public keys cryptography system, there are two keys that are named private key and public key respectively. The public key could be published so that it could be distributed in advance. So it is suitable for the ADS-B system. However, the encrypted data size is too big for using public key cryptography with enough encryption strength. For example, the typical or minimum RSA key size should be 1024 bits or more, this means that if using RSA cryptography is used to encrypt an ADS-B data block (typical payload size is 274 bits in UAT or Universal Access Transceiver), the consequential data size is at least 1024 bits. Therefore the encryption leads to greater expansion compared with the original data size. Furthermore, the greater the encryption strength, the bigger the consequential data size. 1 Communication Author 1
2 FENG Ziliang, PAN Weijun, WANG Yang Simply using encryption technologies to against ADS-B data spoofing should not be applicable, because the broadcasting position data could not be decoded correctly by the public, and this would also violate the original intention of the ADS-B system design. Data authentication technology, sometimes called Data Signature Algorithm (DSA), is a data signature and verification technology, which does not involve changing the original data itself but adds an additional stamping data to guarantee that the data is created by its original hosts. ECC (Elliptic Curve Cipher) has been proved as an excellent public key cryptography with small key size compared with RSA based and examples showed that the encryption strength of ECC with 128 bits key size is similar to the strength of RSA with 1024 bits key size. The ECDSA (Elliptic Curve Data Signature Algorithm) is a data signature algorithm derived from ECC and DSA, and it has been standardized in FIPS 186-3b by NIST [3]. Although the signature data length of ECDSA is twice that of its key, the smaller key size makes it more suitable for ADS-B data authentication. To accommodate the encryption data or signature data, the data block format, include ADS-B IN data and ADS-B OUT data format, should be changed no matter which cryptography is used. The main points of the proposed ADS-B data authentication solution are described as follow. The timestamp data of GPS will be added to check the data reply attack. The original ADS-B out payload and the timestamp data should be signed by ECDSA algorithm with the ECC private key. The signature data will be encapsulated in a new data type of ADS- B out, which will be defined to accommodate new signature data. The new data will be sent together with original payload data through the ADS-B communication channel. The GPS data and signature data in received ADS-B data will be separated from the original payload. The received GPS timestamp could be compared with current time to check the replay attacks, and the signature data could be verified by the ECDSA verification algorithm with the public key in the X.509 certificate, which can be verified by the hierarchy model of X.509 management mechanism. The most significant difference between the proposed solution and others is the use of the X.509 certificate with the ECC public key and the extra GPS timestamp. It makes the ADS-B data authentication solution become practical because of the smaller amount of signature data and the measure of anti-replay attacks. Fig.1. Proposed Solution of ADS-B Data Authentication The proposed solution is shown in fig.1. Where letter S, V, C in circle denote the signature process, the verification process and the comparison process. 3 The Analysis of the Key Technology Three important problems will be discussed in this paper. They are the analysis of authentication data size and the digital signature algorithm, the modification of the data format of ADS-B out, the management and the usage of the X.509 certificate. 2
3 A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE 3.1 Authentication Data Size and the Digital Signature Algorithm The available ADS-B out data space is small and limited in various ADS-B realization technologies [4][5]. A small of signature data is required; meanwhile, it could result in a reduction in the security of the signature. Considering the typical data block size of payload in UAT, there are only 272 bits of data space left, and with the 32 bits HDR data space, there is only 240 bits data space that can be used. To accommodate the GPS data stamp, the elliptic curves over a 112 bit prime field could be selected (such as curve named secp112r1) of which the input data size will be 112 bits at most and the signature data size will be 224 bits. The ECDSA signature output data include two parts, s1 and s2 respectively (in openssl [6] nominated r and s respectively). If other elliptical curves with a higher order are selected, the signature data size will be increased correspondently. In the data signature process, a hash value should be calculated before calculating the ECDSA signature, and the hash function may be chosen to be SHA-1 with the output data block size 160 bits, which is larger than 112, the maximal input size of the selected signature process. This means that the hash value must be truncated before the signature process to fit the ECDSA input block size. The data truncation process will not affect the subsequent signature or verification process, because they are truncated before encryption and it is symmetrical in both signature and verification ends, which is minimally different from the traditional process. The negative effect of the truncation process may be tiny because the discarded data is small even though the process may reduce the security of the signature and it should be ignored completely. The process is illustrated in Fig.2, where letter H in the circle denotes the process of SHA-1 process. 3.2 The Analysis of ADS-B OUT Data Format The GPS timestamp data will be included in the final ADS-B OUT data except signature data and it is useful in avoiding the replay attacks. The 32 bits timestamp can be selected. And it adds the signature data size by 224bits, the new data size is 256 bits, which is larger than the volume size of 240 bits according UAT MOPS (RTCA DO-282) [4] for an ADS-B out message payload excluding the 32 bits HDR field for all type. A compromise timestamp sending solution is used to split the timestamp data into two parts (named T1 and T2) and to send 16 bits once. It means the replay attacks check frequency will be halved. Fig.2. Hash Truncation and Data Signature Algorithm Process Fig.3. UAT data composition of new type 30 A new type 30 is defined to accommodate the GPS timestamp and signature data. It will be 3
4 FENG Ziliang, PAN Weijun, WANG Yang sent following any other original ADS-B data types. This means that the communication volume after adding the signature data will be twice the original volume. The encapsulated data format and package sending sequence is illustrated in Fig.3. The input data of ECDSA signature generation include 3 parts, the last whole payload package (HDR1 and element1), the header or the new payload package (HDR2), and the current GPS timestamp (T1 or T2). In 1090ES, besides the occupation of the aircraft location and other necessary information, only 56 bits of ME field may be used [5]. It is not enough for the above signature data and timestamp, so 4 DF24 (COMM-D) packages may be combined and there are 320 bits payload for the total that could be used to accommodate the signature data and timestamp. The new DF24 package will be sent following DF17. This means that the communication volume will be 5 times as the original volume. 3.3 Management and Using of Certificate The ADS-B aircraft certificate is a special file issued by the CA (Certificate Authority), which should be distributed in public because there is a public key contained in certificate and it can be used to verify the signature of ADS-B out data. A certificate can be considered as the identity of an aircraft because it can be verified by the upper certificate authority in the X.509 hierarchy model. Accordingly the root CAs should be crossed certified with each other so that the aircraft ADS-B certificate in other areas can also be verified through the X.509 hierarchy mechanism. When an ADS-B message should be verified, for example, when a ground station or an aircraft B need to verify the received ADS-B message from the local aircraft A, it has only to perform verification process by using the public key of A; when this is a need to verify the message from an unknown aircraft Z, the hierarchy model or certificate chains should be used to verify the public key of Z step by step, illustrated in Fig.4 as: CAAC<<FAA>>FAA<<AA>>AA<<Z>> When the public key of Z can be verified, it can be used to verify the message from aircraft Z. To verify a message of ADS-B, certificates of all levels are very necessary. But it is impractical to store all the certificates of aircrafts in the world for every verifier, especially for the airborne verifier. A practical certificate exchange and distribution mechanism may be the combination certificate exchange scheme with a static certificate database and dynamic certificates. The establishment of a static certificate database is essential for the ADS-B ground station. It means that a the special ground service network of the ADS-B certificate database, which is helpful in the establishment of certificate chains, the query of a certificate, the revocation of certificates, should be established first, and this is practical and easy. The certificates for one flight are limited. For an airborne receiver, the certificates used during one flight can be estimated and downloaded from the certificate network before take off. FAA<<CAAC>> CAAC<<CAFU C>> CAFUC<<A> Aircraft A CAAC Root CA CAFUC CA Cross Certificated Aircraft B FAA Root CA American Airlines CA Aircraft Z CAAC<<FAA>> FAA<<AA>> AA<<Z>> Fig.4. Certificate Chains and Hierarchy Model The dynamic certificates exchange scheme, which includes certificate or certificate chain request broadcasting and uploading function, is to remedy the insufficiency of the certificate, especially in temporary change of flight plan or in a long distance flight. For example, if aircraft A need to verify another aircraft B without its certificate, it could broadcast the certificate request message of B, and the ground station, nearby aircraft, or aircraft B could respond. If the new certificate could not be verified by A because of the lack of certificate chains, it could 4
5 A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE broadcast the request for certificate chains also. After a request is responded, all the aircraft or ground stations in this area will receive the certificate or chains, and all of them could verify it. This scheme will concern the modification of upload and download data format of ADS-B. Although there are 423 bytes application data space that could be used in the UAT ground uplink message payload [4], which is suitable for the upload of temporary certificate and chains. The data format of certificate request and reply need to be redefined. 4 Laboratory Test The laboratory test is illustrated in Fig.4. There are 3 computers, which are used to denote 2 airborne ADS-B devices (computer A and B) and 1 ground station (computer C), and the clock of all computers was set to the same before test. 3 serial communication lines are used to connect 3 computers to simulate the airground and air-air communication and the baud rate were set to 9600 bps. Two software run in computer C, one is the certificate management software with the function of creating the certificate of root CA or aircraft, distributing certificate; another one is the flight dynamic display software with the function of verifying the received ADS-B message, displaying aircraft dynamics information in the air especially including the verification status of ADS-B data. As illustrated in Fig.5, if an aircraft passes the verification process the message verified in green will displayed in the third line of its tag, if it does not pass, the message will be SP data! or RP Data! in red; if it does not include a verification message, the message will be No Sig in gray. A RS232 Serial Communication with 9600 bps B Aircraft A with Airborne ADS-B Device RS232 Serial Communication with 9600 bps Aircraft B with Airborne ADS-B Device RS232 Serial Communication with 9600 bps Fig.5. Display of ADS-B verification The laboratory experimental testing results showed that the proposed solution is valid and suitable for the verification of ADS-B out data of UAT. C ADS-B Ground Station Fig.4. Scheme of Laboratory Experimental Test There is one software is running in A and B with the function of creating a simulated flight track of aircraft per second, sending encapsulated UAT position package (type 1) and a new package (type 30) per second, receiving the ADS-B package of another aircraft, displaying dynamic information of nearby aircraft. 5 Summary An ADS-B data authentication solution based on the ECC certificate and the X.509 certificate is proposed. The extra signature data and timestamp was appended in the ADS-B out message to verify the original message and to check replay attacks. A suggestion of data format modification of the UAT ADS-B, a combination mechanism of static and dynamic certificate exchange was proposed. Laboratory experimental test results showed that the 5
6 FENG Ziliang, PAN Weijun, WANG Yang solution is valid and suitable for the verification of ADS-B out data of UAT. Acknowledgements This work is supported by CAAC Research Fund (No: MHRD ), the National Nature Science Foundation of China (No: ) and Civil Aviation Flight Technology and Flight Safety Base Fund. References [1] Darryl H Phillips. ADS-B Terrorist's Dream, Security's Nightmare - Will ADS-B Increase Safety and Security for Aviation [2] Behrouz A. Forouzan. Cryptography and Network Security. McGraw-Hill companies, Inc [3] FIPS PUB Digital Signature Standard (DSS). U.S. Department of Commerce, National Institute of Standards and Technology, 2009 [4] RTCA. Minimum Operating Performance Standard for Universal Access Transceiver (UAT) Automatic Dependent Surveillance Broadcast, RTCA DO-282A, July 29, 2004 [5] RTCA. Minimum Operational Performance Standard for 1090 MHz Extended Squitter ADS-B and TIS-B, RTCA DO-260A, April 10, 2003 [6] Nils Larsch. OpenSSL Document for ECDSA Copyright Statement The authors confirm that they, and/or their company or organization, hold copyright on all of the original material included in this paper. The authors also confirm that they have obtained permission, from the copyright holder of any third party material included in this paper, to publish it as part of their paper. The authors confirm that they give permission, or have obtained permission from the copyright holder of this paper, for the publication and distribution of this paper as part of the ICAS2010 proceedings or as individual off-prints from the proceedings. 6
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)
Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
A Digital Signature Scheme in Web-based Negotiation Support System
A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada [email protected]
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Symmetric Mechanisms for Authentication in IDRP
WG1/SG2 WP WG2/WP 488 International Civil Aviation Organization Aeronautical Telecommunication Network Panel (ATNP) WG2 and WG1/SG2 Meetings Honolulu, Hawaii, USA January 1999 Symmetric Mechanisms for
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
HTTPS is Fast and Hassle-free with CloudFlare
HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE [email protected] www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Cryptography and Network Security Digital Signature
Cryptography and Network Security Digital Signature Xiang-Yang Li Message Authentication Digital Signature Authentication Authentication requirements Authentication functions Mechanisms MAC: message authentication
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Crittografia e sicurezza delle reti. Digital signatures- DSA
Crittografia e sicurezza delle reti Digital signatures- DSA Signatures vs. MACs Suppose parties A and B share the secret key K. Then M, MAC K (M) convinces A that indeed M originated with B. But in case
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
With all of the new hype the
T E C H N O L O G Y All About MODE S TRANSPONDERS B Y T O N Y B A I L E Y Air Traffic Control Radio Beacon System (ATCRBS) With all of the new hype the past few months concerning Elementary Surveillance
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 Comodo CA, Ltd. ECC Certificate Addendum to Comodo EV CPS v. 1.03 6 March 2008 3rd Floor, Office Village, Exchange Quay,
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
A New secure email scheme Using Digital Signature with S/MIME
International Journal of Computer Networks and Communications Security VOL. 4, NO. 3, MARCH 2016, 56 62 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A New secure
BlackBerry Enterprise Server Wireless Software Upgrades Version: 4.1 Service Pack: 7. Administration Guide
BlackBerry Enterprise Server Wireless Software Upgrades Version: 4.1 Service Pack: 7 Administration Guide Published: 2009-10-30 SWDT207654-207654-1030044737-001 Contents 1 Upgrading the BlackBerry Device
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
White Paper Utilizing Leveling Techniques in DDR3 SDRAM Memory Interfaces
White Paper Introduction The DDR3 SDRAM memory architectures support higher bandwidths with bus rates of 600 Mbps to 1.6 Gbps (300 to 800 MHz), 1.5V operation for lower power, and higher densities of 2
