Bitcoin Storage Security Survey:
|
|
|
- Hilda Fowler
- 10 years ago
- Views:
Transcription
1 Bitcoin Storage Security Survey: Wallets Cold Storage BIP032 Nicolas T. Courtois - University College London, UK
2 Security of Bitcoin 1. cryptologist and codebreaker Dr. Nicolas T. Courtois 2. payment and smart cards (e.g. bank cards, Oyster cards etc ) 2
3 Crypto Currencies LinkedIn 3 Nicolas T. Courtois
4 Crypto Currencies UCL Bitcoin Seminar research seminar =>In central London, runs EVERY WEEK! public web page: blog.bettercrypto.com / SEMINAR or Google "UCL bitcoin seminar" 4 Nicolas T. Courtois
5 Security of Bitcoin Tried to improve the security baseline My Whole Life: 5
6 Security of Bitcoin Tried to improve the security baseline My Whole Life: Crying Wolf! 51%, Elliptic Curve, OpenSSL... 6
7 Security of Bitcoin It did NOT help, The Wolf was allowed to operate 7
8 Security of Bitcoin We failed to protect our DATA 8
9 Security of Bitcoin We failed to protect our MONEY 9
10 Crypto Currencies Solution = Decentralized P2P 10 Nicolas T. Courtois
11 Crypto Currencies Solution = BlockChain Until recently, we ve needed central bodies banks, stock markets, governments, police forces to settle vital questions. Who owns this money? Now we have a small piece of [ ] computer code that will allow people to solve the thorniest problems without reference to the authorities. [11 June 2014] 11 Nicolas T. Courtois
12 Code Breakers John Nash In 2012 the NSA declassified his hand-written letter: He also says that: [ ] the game of cipher breaking by skilled teams, etc., should become a thing of the past. [ ] 12
13 Groups and ECC exponential security Elliptic Curve Crypto 13
14 Crypto Currencies ECC - Certicom Challenges [1997, revised 2009] 14 Nicolas T. Courtois TOTAL = 725,000 USD
15 Cryptographic Security of ECDSA in Bitcoin If you solve P vs. NP it: 1 M$. P vs. NP Nobel price, Abel price in mathematics: roughly 1M$ Break bitcoin ECC: About 4 BILLION $.
16 Crypto Currencies ECC - Certicom Challenges [1997, revised 2009] secp256k1 NOT INCLUDED no price if you break it 16 Nicolas T. Courtois
17 Crypto Currencies Timely Denial Dan Brown, chair of SEC [Certicom, Entrust, Fujitsu, Visa International ] ``I did not know that BitCoin is using secp256k1. I am surprised to see anybody use secp256k1 instead of secp256r1'', September 2013, 17 Nicolas T. Courtois
18 Groups and ECC Comparison: Used/recommended by: secp256k1 secp256r1 Bitcoin, anonymous founder, no one to blame Y SEC Certicom Research surprised! Y TLS, OpenSSL ever used??? Y 98.3% of EC U.S. ANSI X9.63 for Financial Services Y Y NSA suite B, NATO military crypto U.S. NIST IPSec OpenPGP Kerberos extension Microsoft implemented it in Vista and Longhorn EMV bank cards XDA [2013] German BSI federal gov. infosec agency, y=2015 French national ANSSI agency beyond 2020 Nicolas T. Courtois, Y Y Y Y Y Y Y Y Y
19 Bitcoin Crypto Bets Wanna Bet? 19
20 Crypto Currencies Is Bitcoin Improving? 20 Nicolas T. Courtois
21 Crypto Currencies Bitcoin Troubles Crypto gets broken? Monetary policy: genius, weird or mad? 51% attacks and double spending: easy! P2P network in decline (XX,000=>5,000) Slow speed Poor Anonymity Payment fees decline/stable 21 Nicolas T. Courtois
22 Security of Bitcoin Better Security Will Prevail? NOT obvious, and even LESS obvious in financial systems. A right amount of insecurity: allows you to sell insurance, trains our survival and cybersecurity skills, creates lots of interesting jobs for our students, possibly avoids criminals to engage in more violent crime 22
23 Security of Bitcoin Better Money Will Prevail? Crypto engineers like us sometimes naively hope that better currencies will drive not so good currencies out of business. In fact the Gresham-Copernicus Law [1517] says exactly otherwise! Bad currencies DO frequently drive better currencies out of business. 23
24 Security of Bitcoin Better Money Will Prevail? The bad option is also happening with bitcoin: it has gained excessive popularity NOT because it was technically very good (it never was) or had solid intrinsic value, or it was fast and convenient (it never was). It has thrived because it has created huge expectations which temporarily bitcoin competitors could not meet. Bitcoin remained the obvious choice, a sort of natural monopoly. 24
25 Security of Bitcoin Network Effects! Antonopoulos [former UCL student] points out that "when you have a technology that is good enough that achieves network scale [...] good enough suddenly becomes perfect" I don t see any altcoin displacing it, he says. If bitcoin crashes, again according to Antonopoulos it will be rather because we blow it up by accident. [L.A. Bitcoin Meetup Jan 2014] 25
26 Crypto Currencies Our Works on Bitcoin -cf. also blog.bettercrypto.com -Nicolas Courtois, Marek Grajek, Rahul Naik: The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining, -Nicolas Courtois, Marek Grajek, Rahul Naik: Optimizing SHA256 in Bitcoin Mining, CSS Nicolas Courtois, Lear Bahack: On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency -Nicolas Courtois: On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies -Nicolas T. Courtois, Pinar Emirdag and Daniel A. Nagy: Could Bitcoin Transactions Be 100x Faster? In proceedings of SECRYPT 2014, August 2014, Vienna, Austria. -Nicolas T. Courtois, Pinar Emirdag and Filippo Valsorda: Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, 16 Oct 2014, -Poster: 26 Nicolas T. Courtois
27 Crypto Currencies Cryptome Renamed My Paper: => Actually I show that quite possibly bitcoin is EXEMPT from destruction [natural monopoly]. => Whatever is Bad with bitcoin is even worse with most alt-coins. 27 Nicolas T. Courtois
28 Security Engineering Bitcoin vs. Security Engineering 28
29 Re-Engineering Bitcoin We postulate: 1. Open design. Re-Engineering Bitcoin: 2. Least Common Mechanism [Saltzer and Shroeder 1975] 3. Assume that attacker controls the Internet [Dolev-Yao model, 1983]. 4. The specification should be engineered in such a way that it is hard for developers to make it insecure on purpose (e.g. embed backdoors in the system). 29
30 Security Engineering Open Design Open Source Examples: cryptography such as SHA256 (used in bitcoin) is open source but NOT open design it was designed behind closed doors! 30
31 Open Source Critique Open Source vs. Closed Source and Security 31
32 Open Source Critique Secrecy: Very frequently an obvious business decision. Creates entry barriers for competitors. But also defends against hackers. 32
33 Open Source Critique Kerckhoffs principle: [1883] The system must remain secure should it fall in enemy hands 33
34 Open Source Critique Kerckhoffs principle: [1883] Most of the time: incorrectly understood. Utopia. Who can force companies to publish their specs??? No obligation to disclose. Security when disclosed. Better security when not disclosed. 34
35 Open Source Critique Yes (1,2,3,4): 1. Military: layer the defences. 35
36 Open Source Critique Yes (2): 2) Basic economics: these 3 extra months (and not more ) are simply worth a a lot of money. 36
37 Open Source Critique Yes (3): 3) Prevent the erosion of profitability / barriers for entry for competitors / inimitability 37
38 Open Source Critique Yes (4): 4) Avoid Legal Risks companies they don't know where their code is coming from, they want to release the code and they can't because it's too risky! re-use of code can COMPROMISE own IP rights and create unknown ROYALTY obligations (!!!) clone/stolen code is more stable, more reliable, easier to understand! 38
39 Open Source Critique What s Wrong with Open Source? 39
40 Open Source Critique Kerckhoffs principle: Rather WRONG in the world of smart cards Reasons: side channel attacks, PayTV card sharing attacks But could be right elsewhere for many reasons Example: DES,AES cipher, open-source, never really broken KeeLoq cipher, closed source, broken in minutes 40
41 Open Source Critique *Kerckhoffs principle vs. Public Key Crypto vs. Financial Cryptography In Public Key Cryptography one key CAN be made public. In practice this means that some group of people has it NO obligation to disclose, to make it really public (and it is almost never done in serious financial applications) Full disclosure for public keys is unbelievably stupid cf. next slide! 41
42 Open Source Critique Do NOT Disclose Public Keys! Full disclosure for public keys is simply BAD security engineering and BAD security management. Examples: ATMs have like 6 top-level public keys, not really public though in Bitcoin: the public key can remain a secret for years, only a hash is revealed, this is BRILLIANT key management which makes Bitcoin MUCH more secure that it would otherwise be! it does solve the problem raised by Diffie at CataCrypt in San Francisco: HOW DO YOU PROTECT AGAINST UNKNWOWN ATTACKS? 42
43 Security of Bitcoin Tried to improve the security baseline CataCrypt Conference 43
44 Cryptographic Security of ECDSA in Bitcoin Introducing Bitcoin 44 Nicolas T. Courtois
45 Cryptographic Security of ECDSA in Bitcoin Bitcoin In A Nutshell bitocoins are cryptographic tokens, binary data = stored by people on their PCs or mobile phones ownership is achieved through digital signatures: you have a certain cryptographic key, you have the money. publicly verifiable, only one entity can sign consensus-driven, a distributed system which has no central authority a major innovation: financial transactions CAN be executed and policed without trusted authorities. bitcoin is a sort of financial cooperative or a distributed business. based on self-interest: a group of some 100 K people called bitcoin miners own the bitcoin infrastructure which has costed > 1 billion dollars (my estimation) they make money from newly created bitcoins and fees at the same time they approve and check the transactions. a distributed electronic notary system 45 Nicolas T. Courtois
46 Cryptographic Security of ECDSA in Bitcoin Two Key Concepts initially money are attributed through Proof Of Work (POW) to one public key A to earn bitcoins one has to work (hashing) and consume energy (pay for electricity) now in order to cheat one needs to work even much more (be more powerful than the whole network), more precisely: money transfer from public key A to public key B: like signing a transfer in front of one notary which confirms the signature, multiple confirmations: another notary will re-confirm it, then another, etc we do NOT need to assume that ALL these notaries are honest. at the end it becomes too costly to cheat 46 Nicolas T. Courtois
47 Cryptographic Security of ECDSA in Bitcoin In Practice 47 Nicolas T. Courtois
48 Cryptographic Security of ECDSA in Bitcoin Wallets Wallet: file which stores your money". A Bitcoin client App is also called a wallet 48 Nicolas T. Courtois
49 Cryptographic Security of ECDSA in Bitcoin Bitcoin is a =>PK-based Currency: Digital Currency bank account = a pair of public/private ECDSA keys spend money = produce a digital signature 49 Nicolas T. Courtois
50 Cryptographic Security of ECDSA in Bitcoin Main Problem: Bitcoins can be spent twice. Avoiding this Double Spending is the main problem when designing a digital currency system. 50 Nicolas T. Courtois
51 Cryptographic Security of ECDSA in Bitcoin Block Chain 51 Nicolas T. Courtois
52 Cryptographic Security of ECDSA in Bitcoin Bitcoin Mining Minting: creation of new currency. Confirmation+re-confirmation of older transactions data from previous transactions miner s public key RNG Ownership: policed by majority of miners : HASH must start with 64 zeros 52 Nicolas T. Courtois
53 Cryptographic Security of ECDSA in Bitcoin Def: A transaction database shared by everyone. Block Chain Also a ledger. Every transaction since ever is public. 53 Nicolas T. Courtois
54 Wallets and Key Management Tx LifeCycle It is possible to almost totally separate: Miner nodes burn tx tx Hashing with public keys Peer Nodes public ledger Relay and store transactions and blocks Wallet Nodes Store and release funds, Focus on management of private keys, master keys etc etc Nicolas Courtois
55 Cryptographic Security of ECDSA in Bitcoin Bitcoin Address 55 Nicolas T. Courtois
56 Cryptographic Security of ECDSA in Bitcoin Ledger-Based Currency A Bitcoin Address = a sort of equivalent of a bank account. Reamrks: PK is NOT public! only H(public key) is revealed! PK remains confidential until some money in this account is spent. SK = private key: always keep private, allows transfer of funds. 56 Nicolas T. Courtois
57 Cryptographic Security of ECDSA in Bitcoin Bitcoin Ownership Amounts of money are attributed to public keys. Owner of a certain Attribution to PK can at any moment transfer it to some other PK (== another address). Destructive, cannot spend twice: not spent
58 Cryptographic Security of ECDSA in Bitcoin *Multi-Signature Addresses 58 Nicolas T. Courtois
59 Cryptographic Security of ECDSA in Bitcoin Special Type of Addresses Bitcoin can require simultaneously several private keys, in order to transfer the money. The keys can be stored on different devices (highly secure). 2 out of 3 are also already implemented in bitcoin. (1 device could be absent, money can still be used). Very cool, solves the problem of insecure devices
60 Cryptographic Security of ECDSA in Bitcoin MultiSig: Adding Another Layer Of Security For example 2 out of 3 signatures are required to spend bitcoins.
61 Cryptographic Security of ECDSA in Bitcoin 1993 Multi-Sig Concept is NOT new
62 Cryptographic Security of ECDSA in Bitcoin BTC Transfer 62 Nicolas T. Courtois
63 Cryptographic Security of ECDSA in Bitcoin Bitcoin Transfer Transactions have multiple inputs and multiple outputs. Input Bitcoin Addresses 0.2 BTC 1.3 BTC Transaction Signed by All Owners with their SK 1.0 BTCOutput Bitcoin Addresses0.499 BTC + Fees BTC 63 Nicolas T. Courtois
64 Cryptographic Security of ECDSA in Bitcoin Transaction Scripts 64 Nicolas T. Courtois
65 Cryptographic Security of ECDSA in Bitcoin Signed Tx / Final Tx byte by byte (similar but not identical to raw blocks seen before) (this is done twice, with different scriptsig) scriptsig length 1 byte, e.g. 25=0x19 or 138=0x8A (in Satoshis) scriptpubkey length 1 byte, e.g. 25=0x19 scriptpubkey (never used so far) scriptsig len(1i/1o)= 223= scripts will be detailed later
66 Cryptographic Security of ECDSA in Bitcoin Second scriptsig sign+pkey len= = 138 BUT NOT ALWAYS! scriptsig scriptsig1 r s scriptsig2
67 Crypto Currencies Satoshi claimed it is Is Bitcoin Secure? 67 Nicolas T. Courtois
68 Bitcoin Hardware Wallets Wallets 68 Nicolas T. Courtois
69 Bitcoin Hardware Wallets Bottom Line Main Functionality: -Private Key Generation -Export public key -ECDSA sign BTChip HW1 hardwarewallet.com Ledger ledgerwallet.com -optional: sign full BTC transactions confirm recipient on the screen! (huge classical pb with all smart cards and digital signature devices, Ledger has a clever solution: regurgitates inputs on another device USB keyboard) 69 Nicolas T. Courtois Trezor bitcointrezor.com
70 Bitcoin Hardware Wallets BTChip HW.1 since Jan Nicolas T. Courtois
71 Bitcoin Hardware Wallets *Features of USB card ST23YT66 NESCRYPT crypto-processor for PK crypto 900 ms for 1 ECDSA signature 900 ms for key gen encrypts private keys on the card ( content key) 3DES CBC content key can be protected with a GlobalPlatform Secure Channel authentication mechanism 6K 2K Nicolas T. Courtois
72 Bitcoin Hardware Wallets released March 2014 Trezor by Satoshi Labs Prague, CZ + display: know to whom you send the money! +- has open source firmware: 72 Nicolas T. Courtois
73 Bitcoin Hardware Wallets + Trezor Lite App Allows to see your money when you don t have your device with you! Based on BIP032 audit capability => quite dangerous: see Nicolas T. Courtois, Pinar Emirdag and Filippo Valsorda: Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events, 16 Oct 2014, 73 Nicolas T. Courtois
74 Wallets and Key Management BIP032 Parent Ext. Private k L k Private k k R x chain i Parent Ext. Public K K L K public K Rxchain i.g K public i x chain K public i x chain M HM K M HM K mod q y L y Private y y R y chain ECC.G y L y y Private y R y chain 74 k i c i K i right key =k i.g c i
75 Bitcoin Hardware Wallets Ledger have their own operating system! closed source, their Chrom front-end is open source due to the current JavaCard limitiation: cannot implement deterministic ECDSA (RFC6979) bitcoin tx processing implemented inside (unlike HW.1) claimed to be a more secure evolution of HW.1 communicates with Google Chrome directly, no middleware data retention: 30 years open: no NDA for any wallet to support this 75 Nicolas T. Courtois
76 Bitcoin Hardware Wallets It Implements: Standard Multisig, P2SH style (BIP016) BIP032 : HD Wallets danger, see our paper Solution: implements RFC 6979, deterministic signatures BIP039: seed mnemonic (list of words in English) BIP044: specific wallet structure 76 Nicolas T. Courtois
77 Bitcoin Hardware Wallets master backup Security printed card with master private seed + long passhrase to be written on paper (used only to recover) recovery also possibly if the hardware is lost standard method BIP39, no lock-in, can be recovered on 3 rd party soft/hard enter wrong PIN 3 times=>all data are claimed to be erased claimed totally anonymous except browser IP address will be revealed when you send Tx to the network each device is paired with a printed card A=>3, to be kept with the wallet, this card=second factor authn. (malware cannot use the device) duo edition has the same card: can create 2 identical hardware wallets Pb: PIN code is entered on a PC: BUT to sign a transaction, need to enter correspondance codes A=>3 based on a random sampling of the payment address 77 Nicolas T. Courtois
78 Bitcoin Hardware Wallets CoinKite card + terminal with HSM + supports multisig Pb. each new member receives a "welcome " which contains the "xpubkey" (extended public key) for their deposits. super dangerous! 78 Nicolas T. Courtois
79 Crypto Currencies?? Are Known Wallet Solutions Secure? 79 Nicolas T. Courtois
80 Cryptographic Security of ECDSA in Bitcoin Incidents at Operation: Bad Randoms 80 Nicolas T. Courtois
81 Cryptographic Security of ECDSA in Bitcoin Bad Randoms First publicized by Nils Schneider: 28 January 2013 D47CE4C025C35EC440BC81D99834A A26BF56EF 7FDC0F5D52F843AD1 repeated more than 50 times Used twice by the SAME user!
82 Cryptographic Security of ECDSA in Bitcoin ECDSA Signatures Let d be a private key, integer mod n = ECC [sub-]group order. Pick a random non-zero integer 0<a<n-1. Compute R=a.P, where P is the base point (generator). Let r = (a.p) x be its x coordinate. Let s = (H(m) + d*r ) / a mod n. The signature of m is the pair (r,s). (512 bits in bitcoin)
83 Groups and ECC random a: must be kept secret! RNG random a R=a.P r Attack 2 Users has already happened 100 times in Bitcoin same a used twice => detected in public blockchain => (s 1 a-h(m 1 ))/d 1 = r = (s 2 a-h(m 2 ))/d 2 mod n => r(d 1 -d 2 )+a(s 1 -s 2 ) =H(m 2 )-H(m 1 ) mod n 83 s= (H(m)+dr) / a mod n (r,s) each person can steal the other person s bitcoins! =>any of them CAN recompute k used
84 Groups and ECC random a: must be kept secret! RNG random a R=a.P r Attack Same User has also happened 100 times in Bitcoin same a used twice by the same user (d 1 =d 2 ). In this case we have: (s 1 a-h(m 1 )) = rd = (s 2 a-h(m 2 )) mod n => a=(h(m 1 )- H(m 2 ))/(s 1 -s 2 ) mod n AND now d=(sa-h(m))/r mod n 84 s= (H(m)+dr) / a mod n (r,s) anybody can steal the bitcoins!
85 Cryptographic Security of ECDSA in Bitcoin Android bug was fixed Stopped in August 2013
86 Cryptographic Security of ECDSA in Bitcoin Dec At 30C3 conference in Germany on 28 Dec 2013 Nadia Heninger have reported that they have identified a bitcoin user on the blockchain which has stolen some 59 BTC due to these bad randomness events, The money from the thefts is stored at: a6kxbsdj Still sitting there, he is NOT trying to spend it too famous? Afraid to be traced and caught?
87 Cryptographic Security of ECDSA in Bitcoin Second Major Outbreak May 2014
88 Cryptographic Security of ECDSA in Bitcoin From my own scan: Recent Bad Randoms 0f25a7cc9e76ef38c0feadcfa5550c173d845ce36e16bde09829a 3af Appears 8 times in block September 2014 Used by different users
89 Cryptographic Security of ECDSA in Bitcoin Previous attacks: So What? Classical bad random attacks typically concern only very few bitcoin accounts, and only some very lucky holders of bitcoins can actually steal other people's bitcoins. Only a few hundred accounts in the whole history of bitcoin are affected.
90 Cryptographic Security of ECDSA in Bitcoin The Really Scary Attacks New attacks [Courtois et al. October 2014] => under certain conditons ALL bitcoins in cold storage can be stolen =>millions of accounts potentially affected.
91 Cryptographic Security of ECDSA in Bitcoin New Paper: cf. eprint.iacr.org/ 2014/848/
92 Cryptographic Security of ECDSA in Bitcoin Is There a Fix? Solution: RFC6979 [Thomas Pornin] HOWEVER, no existing cold storage solution which have NOT already applied RFC6979 can claim to resist our attacks.
93 Groups and ECC RFC6979 [Pornin] = 5+ applications of HMAC k priv H(m) e. V d. M M HMAC-SHA256 HMAC-SHA256 V 256 V 01 k priv H(m) Nicol as T. 93 V 256 g. (normally a loop BUT not needed for 256 bits output k) K K 256 K M HMAC-SHA256 K V 256 h. f. M HMAC-SHA256 K M K 256 HMAC-SHA256 K v 256 k 256 ECDSA
94 Cryptographic Security of ECDSA in Bitcoin Which Systems Are Affected? Solution: RFC6979 [Pornin] Alredy applied by Electrum,Multibit, Trezor Yet unpatched: blockchain.info insecure, BitcoinD Core waiting for a patch to be applied, Details: a talk at Hack in The Box conference 15/10/2014: %20Exploiting%20ECDSA%20Failures%20in%20the%20Bitcoin%20Blockchain.pdf
Bitcoin Miner Optimization
Bitcoin Miner Optimization Nicolas T. Courtois - University College London, UK Bitcoin Mining Bottom Line Bitcoin Mining = a high tech race to determine who will own the currency of the 21 century 2 Nicolas
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
msigna Getting Started
msigna Getting Started Thank you for deciding to try msigna, the most powerful secure cryptocoin storage solution available. We think you will enjoy using msigna as it is, but it is still a product under
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
BitIodine: extracting intelligence from the Bitcoin network
BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo http://miki.it [email protected] @mikispag Bitcoin BitIodine About Bitcoin Decentralized, global digital currency A global
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider
efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider January 2015 Introduction Competition is fierce in the exploding online backup industry. With so many
Bitcoin: Concepts, Practice, and Research Directions
Bitcoin: Concepts, Practice, and Research Directions Ittay Eyal, Emin Gün Sirer Computer Science, Cornell University DISC Bitcoin Tutorial, October 2014 Barter Gold Fiat 2 Barter Gold Fiat Bitcoin 2008:
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Bitcoin Thief Tutorial
The complete Bitcoin Thief Tutorial SESSION ID: HTA-R02 Uri Rivner Head of Cyber Strategy BioCatch Etay Maor PMM Cyber Trusteer, an IBM Company The first few things you should know about Bitcoin Most people
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
HTTPS is Fast and Hassle-free with CloudFlare
HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE [email protected] www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
SSL Handshake Analysis
SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. [email protected] Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
CNT5410 - Computer and Network Security Review/Wrapup
CNT5410 - Computer and Network Security Review/Wrapup Professor Kevin Butler Fall 2015 Review What did we talk about this semester? Cryptography secret vs public-key key exchange (Diffie-Hellman) symmetric
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Principles of Computer Security. Dr George Danezis ([email protected])
Principles of Computer Security Dr George Danezis ([email protected]) Why SecAppDev? Learning security on the job is necessary. However, Foundations: Principles. (Today) Access control. Advances: Privacy-friendly
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:
SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Orwell. From Bitcoin to secure Domain Name System
Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl
Strengths and Weaknesses of Cybersecurity Standards
Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium [email protected] April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
A Question of Key Length
A Question of Key Length Does Size Really Matter When It Comes To Cryptography? White Paper December 7, 2015 By Alessio Di Mauro A Question of Key Length 2015 Yubico. All rights reserved. Page 1 of 10
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
End User Encryption Key Protection Policy
End User Encryption Key Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization.
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
An Analysis of the Bitcoin Electronic Cash System
An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014
Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
W3C Web Crypto APIs. Status of current specifications and future plans. Virginie GALINDO chair of Web Crypto WG
W3C Web Crypto APIs Status of current specifications and future plans Virginie GALINDO chair of Web Crypto WG Web Crypto APIs use cases Web Crypto APIs allow web apps to build their own security model,
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Recoverable Encryption through Noised Secret over Large Cloud
Recoverable Encryption through Noised Secret over Large Cloud Sushil Jajodia 1, W. Litwin 2 & Th. Schwarz 3 1 George Mason University, Fairfax, VA {[email protected]} 2 Université Paris Dauphine, Lamsade
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
Practical Invalid Curve Attacks on TLS-ECDH
Practical Invalid Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky Horst Görtz Institute for IT Security Ruhr University Bochum @jurajsomorovsky 1 1 About Me and Our Institute Security
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
CS 3251: Computer Networking 1 Security Protocols I
Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I Last Time Trying to prove who you are
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.
1 / 40 Crypto () Client security Server security 2 / 40 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
