Deriving Secure Network Protocols for Enterprise Services Architectures
|
|
|
- Audra Todd
- 10 years ago
- Views:
Transcription
1 1 Deriving Secure Network Protocols for Enterprise Services Architectures Matthias Anlauff, Dusko Pavlovic, and Asuman Suenbuel Kestrel Institute SAP Research Labs 3260 Hillview Avenue 3175 Deer Creek Road Palo Alto, CA Palo Alto, CA Abstract Enterprise Service Architectures are emerging as a promising way to compose Web-Services as defined by the W3C consortium, to form complex, enterprise level services. However, due to the fact that each Web-Service composition is also a protocol composition, this composition gets problematic, if security protocol mechanisms are used for the individual Web-Services, because security properties are not preserved under composition. This paper outlines the approach of protocol derivations that on the one hand mimics the general engineering practice when combining security features, but on the other hand avoids the problems that can arise during the composition of Web-Services by using well-founded mathematical concepts. The Protocol Derivation Assistant, a tool that supports this approach, is also introduced in this paper. I. INTRODUCTION Today s challenges in providing web-based services have manifested itself in the definition of enterprise level frameworks for the efficient and controlled composition of Web- Services, a W3C initiative to provide a standard means of interoperating between different software applications, running on a variety of platforms and/or frameworks, see [2]. Enterprises have discovered the potential behind the concepts of Web-Services and have started to provide frameworks that make use of this approach. SAP Netweaver is a prominent example of such a framework with its Enterprise Service Architecture component ([13]). Other companies, especially those providing integration solutions for business customers, are starting to also develop similar framework based on the Web-Services architecture. An atomic Web-Services-based exchange is sketched in Figure 1. It shows the roles and different phases of a service request and execution. The enterprises use the Web-Services to automate tool connections that often are made by hand, for example, by a human manually typing information that one tool has produced as output into the input forms of one or more other tools that further process the data. The existence of a standard like Web-Services nourishes the hope that these interface help automating these processes. Figures 2 and 3 show an example of the approach taken by the integration frameworks on top of Web-Services: migrating from hardwired, often manual-input based connections between the different tasks, the Web-Services can be used to automate this process. This paper focuses on a very important aspect of Enterprise Service Architectures based on Web-Services: network secu- Fig. 1. The General Process of Engaging a Web Service (source: [2]) rity. In the following section, we will explain the parallels between Enterprise Service Architecture and protocol derivation, and explain the implications of this, namely the problem of non-compositionality of security concepts. After that, we will introduce the concepts of the approach of protocol derivations, and try to explain how this can be used in the context of Enterprise Services. II. (SECURE) ENTERPRISE SERVICE COMPOSITION = (SECURITY) PROTOCOL DESIGN The Enterprise Service Architecture frameworks are based on the idea of composing Web-Services so that new services emerge from that process. Those can in turn become part in the definition of even more complex processes. If we look at this from a communications point of view, we notice that each web-service establishes a data exchange between the integration framework server and the web-service client providing the service. The composition of Web-Services, as promoted by the Enterprise Service Architectures, is therefore also a composition of message exchanges, which is in general referred to as protocols. In other words, by composing Web-Services from different servers, one is establishing a communication protocol between the participating agents. In many cases, the individual Web-Service invocations make use of standard encryption mechanisms in order to protect sensitive business data from being compromised. Thus, the
2 2 Fig. 2. [13]) Service connections without Web-Services-based techniques (source: by researchers, the common practice of protocol development composes security protocols and tries to minimize the possible security holes by extensive testing. The basis of the work we are presenting in this paper is a framework for deriving security protocols based on mathematically well-founded concepts, as outlined in [4], [6], [11]. The general idea of this approach is it to capture the common practice of security protocol engineering and put it onto a solid foundation. The mentioned approach has been used for detecting a security hole in the GDOI protocol, a internet draft for group communication applications (e.g. pay-per-view). The mentioned approach helped uncovering a security flaw that otherwise remained undetected by an expert group over several years and through half a dozen internet drafts; see [11]. With Enterprise Service Architectures and with it the composition of Web-Services becoming more and more popular, this scenario is very likely being repeated, if the services are composed without having this problem concerning the security features in mind. In the following, we will give a brief overview of our the basics of our protocol composition approach; after that, we will outline the functionality of the Protocol Derivation Assistant, a tool supporting this approach. Fig. 3. Using Web-Services-based techniques to automate business processes involving components from different providers (source: [13]) composition of Web-Services involves the composition of security mechanisms in the hope that the security features of one individual Web-Services protocol survive the composition with others. But this is exactly the error, many developers of systems involving security protocol composition make: the composition of two or more secure (sub-)protocols can lead to insecure protocols. In other words, security properties of protocols are not compositional. A simple example would the composition of a protocol establishing a secret key between client and server with a protocol sending this key in the clear as part of a message exchanged between the client and the server. Although this fact is known and has been published III. BRIEF OVERVIEW OF CHALLENGE RESPONSE LOGIC The logic we use is built out of simple axioms describing the conclusions that a principal can draw from her observations of protocol actions, using the known axioms. These axioms are usually of the form: If A performs certain sequence of actions, then A can conclude that some other sequence of actions by other parties, also occurred. For instance, if A receives a message, then she can conclude that someone must have sent that message; if that message contains a term only B can form, then she knows that B must have been on the path of the message. The notation will be used as follows. A language of terms t, sent in messages, is assumed. It includes variables for unknown terms or agents, and sufficient typing. The expression (νm) describes the generation of a fresh nonce m. The expression t A describes the action of the agent A sending a message containing a term t, while t A denotes A sending just t. The expression ((t)) A describes A s receiving a message containing a term t, while (t) A denotes A s receiving just t. When the source and the destination of a sent or received message are relevant, then these actions can be extended to t : A B C and ((t : A B)) C, where A and B are respectively the purported source and destination fields, whereas C is the principal who actually performs the action. On the other hand, the subscript C < (e.g. as in t C< etc.) means that C is the originator of the relevant message. 1 Atomic statements are generated over actions in one of the following forms: a < b the action a has occurred before b, a = b the actions a and b are identical, and 1 Formally, t C< abbreviates c.c = t C b.b = t B b c, and t B itself abbreviates U(t) B, for some transparent term U(t). The details are in [12].
3 3 a the action a has occurred. The equality of actions identifies the expressions describing them. The composite statements are now generated by the usual connectives and the first order quantifiers. Each statement is annotated by a prefix A :, denoting the view or knowledge of agent A. There are two basic axioms that describe the semantics of the actions of sending and receiving messages. (t) = a. a = t a < (t) (νm) M = a A. ( m F V (a) a > (νm) ) A M (νm) M < m M < ((m)) A a A (rcv) (new) The (rcv) axiom says that if a message is received, it must have been sent. The (new) axiom says that, if a fresh value is generated, then any action involving that fresh value must occur after its generation; moreover, if some principal other than the originator receives a message containing the fresh value, then the originator of the value must have sent a message containing it. All principals are assumed to know these axioms 2. Axiom (cr) supports the reasoning of the initiator of a challenge-response protocol. It is formalized as follows: A : (νm) A ( c AB m A < ((r AB m)) A = c AB m A < ((c AB m)) B < r AB m B< < ((r AB m)) A ) (cr) The expression c AB m denotes a challenge function applied to m, while the expression r AB m denotes a response function applied to m. The axiom can be viewed as a specification of the requirement defining these two functions. It tells that A can be sure that if she issues a message containing a challenge c AB m, and receives response containing r AB m, then B must be the originator of that response. In other words, B is the only agent who could have transformed c AB m to r AB m, given the A s own observed actions. In the various instances of axiom (cr), functions c and r satisfying the above specification, can be implemented in various ways, e.g. taking B s signature as the response, or B s public key encryption as the challenge. In each case, it will need to be proved that the particular implementation, satisfies the specified requirement. The logic also contains axioms for composing, refining and transforming protocols. A transformation or refinement usually adds a new property or functionality to the protocol, in which case it comes annotated with an axiom, leading to new conclusions. In authentication protocols, such axioms may expand principal s knowledge about the events in the run of the protocol that he is participating. For example, in the basic challenge-response axiom there is no indication that B intended its message as a response to A s particular challenge. This would need to be supplied by some refinement 2 F V (a) stands for the set of free variables in a introducing a specific integrity token, such as computing a MAC. Below, we describe a derivation of a simple challenge and response protocol. As usually, messages are represented by horizontal arrows from one principal to another. A vertical line corresponds to principal s internal change of state. If the principal creates a new value m, this is represented by putting νm next to the appropriate vertical line. There are several properties of protocols that will be of interest here. One, known as matching protocol runs, due to Diffie, van Oorschot, and Wiener [5], says that after two principals complete a protocol successfully, then they both should have the same history of messages sent. Another, due to Lowe [10], known as agreement, says that the principals should not only agree on the message history, but who the participants were in the protocol, and which roles each played. a) Assumptions.: A principal can be honest, and follow the protocol, or dishonest, and perform arbitrary actions. However, it is assumed that neither an honest nor a dishonest principal can compromise the private data used to authenticate him. This means that a response function in a challenge response protocol cannot be delegated. One way to interpret this is that the identity is reduced to possession of authenticating data: whoever has the data, is recognized as a legitimate carrier of the identity. 3 More innocently, the same assumption can be construed as a simplifying convention, introduced to avoid carrying explicit conditions in proofs; but they can be added when needed. We also tacitly assume strong typing. If a principal, for example, attempts to use data of one type in place of data of another type (e.g. a key in the place of a nonce), this will be detected and the message will be rejected. This again is a relatively strong assumption, but has been shown to lead to no essential loss of analytical power, under certain reasonable provisos [9]). These assumptions are a matter of convenience, which will undoubtedly be modified in future work. For example, one of the properties of interest for GDOI and many other protocols is perfect forward secrecy, which describes the behavior of the protocol after a master key is compromised. IV. THE PROTOCOL DERIVATION ASSISTANT The Protocol Derivation Assistant (PDA) [1] is to support incremental derivations of practical security protocols, together with proofs of their security properties. The protocol derivations start from basic protocol components, and use generic refinements and transformations, just like proof derivations start from axioms, and use generic proof rules and proof transformations. But the guiding idea of PDA is capture incremental methods of protocol design arising in practice, and support them in a framework open for evolution rather than to attempt to reduce security to a predetermined set of formal 3 For instance, no principal can pass his fingerprints or handwriting to others. In cryptographic authentication, this means that no agent can disclose the master keys, used to authenticate him: they are strictly bound to his identity. Finally, there are protocols for which such assumptions do not lead to any loss of the ability to reason about security (the Machiavellian protocols of Cervesato et al., [3]), but we do not necessarily limit ourselves to these.
4 4 rules. The envisioned results should enable assured protocol derivations, running in parallel with proofs of the desired security properties. Such parallel derivations would be realized using a library of protocol components, generic refinements and transformations, carrying proofs of the relevant security and preservation properties. Alternatively, the same system could cater for attack derivations, running in parallel with the proofs of vulnerabilities. PDA s user interface consists of a graphical editor; protocols are represented in a similar two-dimensional style as they can be found in text-books and papers. This representation resembles the desired run of the protocol, i.e. the flow of information that a protocol designer has in mind when designing a certain protocol. In the following, we will show some basic concepts of the tool and provide screen dumps to show the look-and-feel. PDA is implemented as an Eclipse [7] plugin using the GEF [8] framework. The basic entity of a protocol derivation using PDA is a protocol. A protocol is a distributed program. To specify a protocol, we must specify a sequence of actions to be executed by every participant in the protocol. Actions divide into two groups: external actions i.e. sending and receiving a message and internal actions i.e. generating nonces, keys, decryption and other local computation. Protocols are entered into Pda via a straightforward interface. Program of every agent is a linear sequence of state descriptions (Stads), with transitions being either send, receive, or agent step (internal computation). For example, two-party protocol CR[I,R](c,r) is shown in Figure 4. A. Protocol Derivation (1): Instantiation Simplest derivation step is protocol instantiation. Using the Create New Instance command, some (or all) of the function variables can be refined to concrete primitives or other function variables. For example, we can get a one-way challengeresponse protocol using nonces and signature as an instance of CR[I, R](c, r) with the following instantiation: SCR[I, R] = CR[I, R](c(x, y, z) = z, r(x, y, z) = Sig(y, z, x)) In the resulting protocol SCR[I,R], agent I sends a fresh nonce to R who replies with his signature over the nonce and I s identity, as shown in Figure 5. Fig. 5. The instantiated CR protocol Fig. 4. The basic Challenge-Response protocol as entered into the PDA Agent I (initiator) has the following sequence of actions: generate a new nonce m, send the message c(i, R, m) to R, receive a message r(i, R, m) from R. Agent R (responder) receives a message c(i, R, m) from I and sends a message r(i, R, m) to I. Messages exchanged in the protocol contain concrete cryptographic primitives such as encryption, signature and hash, and function variables such as c and r in this example. When a protocol contains function variables, we say that it is a protocol template. Protocol header CR[I, R](c, r) should be read: CR is a two party protocol (agents are named I and R), using abstract function variables c and r. B. Protocol Derivation (2): Composition As mentioned earlier, protocols can be combined using composition; we will outline this concept using a simple sequential composition operator. In a resulting protocol, program of each agent is a concatenation of their programs from the two protocols. For example, protocol T wo CR[I, R](c, r, c0, r0) is obtained by sequentially composing CR[I, R](c, r) with it s reverse copy Reverse CR[I, R](c0, r0) (which is in turn obtained by simple instantiation Reverse CR[I, R](c0, r0) = CR[R, I](c0, r0)). Protocols can be composed using a concept that is called Rules in PDA. Rules can be regarded as graphical macros that allow for the definition of customized composition operators. C. Proofs Alongside the development of the protocols, the proof obligations that are affiliated with each of them are recorded and given to an automatic theorem prover. Using the basic challenge-response logic as basis, PDA provides not only a graphical tool for designing and deriving protocols, but also the ability to prove whether certain security properties survived the composition with another (sub-)protocol.
5 5 [8] GEF-Team. The Graphical Editing Framework (GEF), URL [9] J. Heather, S. Schneider, and G. Lowe. How to prevent type flaw attacks on security protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June [10] G. Lowe. A hierarchy of authentication specifications. In Proceedings of the 10th IEEE Computer Security Foundations Workshop, pages IEEE Computer Society Press, [11] Catherine Meadows and Dusko Pavlovic. Deriving, attacking and defending the gdoi protocol. In Peter Ryan, Pierangela Samarati, Dieter Gollmann, and Refik Molva, editors, Proceedings of ESORICS 2004, volume 3193, pages Springer Verlag, [12] D. Pavlovic and C. Meadows. Deriving authenticity and integrity as order of actions. Technical report, Kestrel Institute technical report, January [13] SAP. Enterprise services architecture an introduction. SAP White Papers, URL WP Enterprise Services Architecture Intro.pdf. Fig. 6. Sequential composition of Protocols V. SUMMARY In this paper, we have outlined the problems of Enterprise Service Architectures with respect to network security caused by the general lack of composability of message exchanges as an result of composing Web-Services. We have outlined and briefly explained our derivational approach to protocol development as well as the Protocol Derivation Assistant, a software system that supports the derivational design approach of the underlying protocol logic. In the near future, we will expand our research work in this area and we are planning to conduct more experiments, especially in the area of business applications. REFERENCES [1] Matthias Anlauff and Dusko Pavlovic. The protocol derivation assistant, URL [2] D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion, C. Ferris, and D. Orchard (eds.). Web services architecture. W3C Working Group Note, URL [3] I. Cervesato, S. Meadows, and P. Syverson. Dolev-Yao is no better than Machiavelli. In First Workshop on Issues in the Theory of Security: WITS 00, July [4] A. Datta, A. Derek, J.C. Mitchell, and D. Pavlovic. Secure protocol composition. In Proceedings of ACM Workshop on Formal Methods in Computer Security 2003, pages , Washington, DC, October ACM. [5] W. Diffie, P. C. van Oorschot, and M.l J. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2: , [6] N.A. Durgin, J.C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(4): , [7] Eclipse-Team. Eclipse, URL
SECURITY ANALYSIS OF NETWORK PROTOCOLS: COMPOSITIONAL REASONING AND COMPLEXITY-THEORETIC FOUNDATIONS
SECURITY ANALYSIS OF NETWORK PROTOCOLS: COMPOSITIONAL REASONING AND COMPLEXITY-THEORETIC FOUNDATIONS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES
Formal Methods in Security Protocols Analysis
Formal Methods in Security Protocols Analysis Li Zhiwei Aidong Lu Weichao Wang Department of Computer Science Department of Software and Information Systems University of North Carolina at Charlotte Big
Security Protocols And Their Advantages
Electronic Notes in Theoretical Computer Science 83 (2004) URL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Computational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Joe-Kai Tsay and Stig F. Mjølsnes Department of Telematics Norwegian University of Sciences and Technology, NTNU {joe.k.tsay,[email protected]}
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Modeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt [email protected] Paper and slides available
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
How to Formally Model Features of Network Security Protocols
, pp.423-432 http://dx.doi.org/10.14257/ijsia How to Formally Model Features of Network Security Protocols Gyesik Lee Dept. of Computer & Web Information Engineering Hankyong National University Anseong-si,
A Search-Based Framework for Security Protocol Synthesis
A Search-Based Framework for Security Protocol Synthesis Hao Chen Submitted for the degree of Doctor of Philosophy The University of York Department of Computer Science April 2007 For My Mum and Dad 献
Verifying security protocols using theorem provers
1562 2007 79-86 79 Verifying security protocols using theorem provers Miki Tanaka National Institute of Information and Communications Technology Koganei, Tokyo 184-8795, Japan Email: [email protected]
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
1. a. Define the properties of a one-way hash function. (6 marks)
1. a. Define the properties of a one-way hash function. (6 marks) A hash function h maps arbitrary length value x to fixed length value y such that: Hard to reverse. Given value y not feasible to find
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
Security Analysis of (Un-) Fair Non-repudiation Protocols
Security Analysis of (Un-) Fair Non-repudiation Protocols Sigrid Gürgens and Carsten Rudolph Fraunhofer Institute for Secure Telecooperation SIT Rheinstrasse 75, D-64295 Darmstadt, Germany {guergens,rudolphc}@sit.fraunhofer.de
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Butin 1 / 37 2 / 37 Introduction Network communication sensitive: banking, private correspondence,
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Lab 7. Answer. Figure 1
Lab 7 1. For each of the first 8 Ethernet frames, specify the source of the frame (client or server), determine the number of SSL records that are included in the frame, and list the SSL record types that
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
jeti: A Tool for Remote Tool Integration
jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Automated Program Behavior Analysis
Automated Program Behavior Analysis Stacy Prowell [email protected] March 2005 SQRL / SEI Motivation: Semantics Development: Most engineering designs are subjected to extensive analysis; software is
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext
Part 2 Plaintext M Encrypt with public key E(M, K) Ciphertext Plaintext M D(E(M, K),K ) Decrypt with private key E(M, K) Public and private key related mathematically Public key can be published; private
COMPOSITION, EQUIVALENCE AND INTEROPERABILITY: AN EXAMPLE
COMPOSITION, EQUIVALENCE AND INTEROPERABILITY: AN EXAMPLE Leszek Lechowicz (Department of Electrical and Computer Engineering, Northeastern University, Boston, MA; [email protected]); Mieczyslaw M.
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Cryptography and Network Security: Summary
Cryptography and Network Security: Summary Timo Karvi 12.2013 Timo Karvi () Cryptography and Network Security: Summary 12.2013 1 / 17 Summary of the Requirements for the exam The advices are valid for
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
SIGMA: the SIGn-and-MAc Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols
SIGMA: the SIGn-and-MAc Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols Hugo Krawczyk June 12, 2003 Abstract We present the SIGMA family of key-exchange protocols and the SIGn-and-MAc
Requirements for Security Protocols
Requirements for Security Protocols Wuu Yang Department of Computer Science National Chiao-Tung University Hsin-Chu, Taiwan, R.O.C. w Rong-Hong Jan Department of Computer Science National Chiao-Tung University
Lightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3
Chapter 7 Application Protocol Reference Architecture
Application Protocol Reference Architecture Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
APPLYING FORMAL METHODS TO CRYPTOGRAPHIC PROTOCOL ANALYSIS: EMERGING ISSUES AND TRENDS
PPLYING FORML METHODS TO CRYPTOGRPHIC PROTOCOL NLYSIS: EMERGING ISSUES ND TRENDS Catherine Meadows Code 5543 Center for High ssurance Computer Systems US Naval Research Laboratory Washington, DC 20375
Architecture Design & Sequence Diagram. Week 7
Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
VDM vs. Programming Language Extensions or their Integration
VDM vs. Programming Language Extensions or their Integration Alexander A. Koptelov and Alexander K. Petrenko Institute for System Programming of Russian Academy of Sciences (ISPRAS), B. Communisticheskaya,
Demonstration of an Automated Integrated Test Environment for Web-based Applications
Demonstration of an Automated Integrated Test Environment for Web-based Applications Tiziana Margaria 1,2, Oliver Niese 2, and Bernhard Steffen 2 1 METAFrame Technologies GmbH, Dortmund, Germany [email protected]
Secure Software Architecture Description using UML Jan Jürjens Competence Center for IT Security Software & Systems Engineering TU Munich, Germany
Secure Software Architecture Description using UML Jan Jürjens Competence Center for IT Security Software & Systems Engineering TU Munich, Germany [email protected] http://www.umlsec.org Problems, Causes
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?) Hugo Krawczyk Abstract. We study the question of how to generically compose symmetric encryption and authentication
