Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting
|
|
|
- Justin Washington
- 10 years ago
- Views:
Transcription
1 Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Butin 1 / 37
2 2 / 37
3 Introduction Network communication sensitive: banking, private correspondence, business-critical data Cryptography contributes to network security But not sufficient in itself! 3 / 37
4 Security Layers Several levels at which attacks can and have been led: Hardware (e.g. side-channel attacks) Cryptographic primitives Security protocols Ceremonies 4 / 37
5 Security Protocol Goals Classically: authentication, secret sharing, electronic payment... New, more complex needs: electronic voting, secure multiparty computation, electronic cash... 5 / 37
6 Analysing Security Protocols Many methods: Model checking Automated / interactive theorem proving Static analysis, applied pi calculus, strand spaces... Tools with automation: ProVerif, AVISPA, Scyther, AKiSs... 6 / 37
7 Interactive Theorem Proving Uses mathematical reasoning to determine if protocol reaches its security goals Unlike model checking, population unbounded Doesn t provide explicit attack but may give clues Interactive Our choice Isabelle 7 / 37
8 The Inductive Method Application of Isabelle ( generic proof assistant!) to security protocol verification Paulson 1996, then Bella Uses mathematical induction to model and verify protocols + goals 8 / 37
9 Principles of the Inductive Method Unbounded number of agents Dedicated datatypes (keys, hashes, nonces... ) Events for message sending, reception, agent knowledge Inductive reasoning over network event lists (traces) Cryptographic algorithms idealised 9 / 37
10 Threat Model Attacker = Spy Controls network (Dolev-Yao) Eavesdropping + dynamic behaviour, can also act like normal agent 10 / 37
11 Goal Definition and Proving Protocol security goals predicates over all possible traces User specifies techniques to use: basic induction, rewriting, automatic prover... In most cases, several subgoals generated and user input required again 11 / 37
12 Modelling Properties Example Authentication of an agent: [[A / bad; B / bad; evs ns public]] = Crypt (pubek A) { Nonce NA, Nonce NB, Agent B } parts (spies evs) Says A B (Crypt (pubek B) { Nonce NA, Agent A }) set evs Says B A (Crypt (pubek A) { Nonce NA, Nonce NB, Agent B }) set evs 12 / 37
13 Protocols Verified in Isabelle So Far Protocol Class Year Author(s) Yahalom Key sharing, authentication 1996 Paulson NS symmetric Key sharing 1996 Paulson & Bella Otway-Rees (with variants) Authentication 1996 Paulson Woo-Lam Authentication 1996 Paulson Otway-Bull Authentication 1996 Paulson NS asymmetric Authentication 1997 Paulson TLS Multiple 1997 Paulson Kerberos IV Mutual authentication 1998 Bella Kerberos BAN Mutual authentication 1998 Paulson & Bella SET suite Multiple Bella et al. Abadi et al. certified Accountability 2003 Bella et al. Shoup-Rubin smartcard Key distribution 2003 Bella Zhou-Gollmann Non-repudiation 2003 Paulson & Bella Kerberos V Mutual authentication 2007 Bella TESLA Broadcast authentication 2009 Schaller et al. Meadows distance bounding Physical 2009 Basin et al. Multicast NS symmetric Key sharing 2011 Martina Franklin-Reiter Byzantine 2011 Martina Onion routing Anonymising 2011 Li & Pang 13 / 37
14 New Applications General Approach Adapt Isabelle theory framework (specifications of messages, events, keys, knowledge... ) Model protocol steps Formalise novel guarantees: sometimes hardest step Proofs (interactive) 14 / 37
15 Analysing Composed Protocols Typical real-world scenario of security protocol use Analysis issue not solved in general, partially supported by Scyther Not done before in the Inductive Method 15 / 37
16 Protocol Composition Paradigm Certificate distribution sequenced with authentication Specified by two linked inductive models Better guarantee availability (implicit public key binding) 16 / 37
17 Protocol Composition Discussion Scalable semantics, not limited to two protocols No compositionality theorem as for Scyther Case study extendable to detailed PKI 17 / 37
18 Auditable Identity-Based Signatures Proposed by David Gray in 2007 Provide stronger non-repudiation than standard IBS (mitigate key escrow) Separate audit step allows third party to ensure signature origin Relies on additional audit key-pair; private one required to sign and registered with KGC 18 / 37
19 ISO/IEC Amendment presents new authentication protocols We study Five-pass mutual authentication with TTP, initiated by A Side-by-side specification of IBS and AIBS versions Focus is not on the protocol itself but on AIBS 19 / 37
20 Auditable Identity-Based Signatures Theories 20 / 37
21 Auditable Identity-Based Signatures Modelling Key package datatype: datatype pack = Pack key key Auditable signature structure: Crypt (prisk A) { Crypt (priek A) M, M } Can only sign with key package + private key: [[evss iso; X synth(analz (spies evss)); Key (priek A) analz (spies evss); Pkg (KP A B) analz (spies evss)]] = Notes Spy Crypt (prisk B) { Crypt (priek A) X, X } # evss iso 21 / 37
22 Auditable Identity-Based Signatures Modelling candidates function input agent name, output set of potential signers who leave a trace Classic authentication results + focus on signatures Comparative analysis shows operational auditable feature of AIBS 22 / 37
23 Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification through theorem proving + mathematical induction Toolbox built with FOO as example protocol 23 / 37
24 Motivation Analysis of e-voting dominated by ProVerif automatic verifier Powerful, but sometimes limited Motivation to fill in the gaps with complementary, alternative approach 24 / 37
25 Related Work Ryan / Kremer / Delaune: applied pi calculus, partially mechanized through ProVerif Observational equivalence: traces in which two voters swap their votes are equivalent in a sense Parts of the proof done by hand 25 / 37
26 E-voting Protocols New properties : privacy, verifiability, coercion-resistance... Partially studied with applied pi calculus, but with little mechanisation Often require modelling new crypto primitives 26 / 37
27 E-voting protocols: properties Eligibility Fairness Privacy / Receipt freeness / Coercion resistance linkability concept (hard) Individual / Universal verifiability 27 / 37
28 The FOO Protocol Fujioka, Okamoto and Ohta, 1992 Two election officials, bit commitment, blind signatures Signed, blinded commitment on a vote 6 steps 28 / 37
29 Specifying Blind Signatures Directly in Message.thy limitation of operators interplay Solution: as part of inductive model [[evsb foo; Crypt (prisk V) BSBody analz (spies evsb); BSBody = Crypt b (Crypt c (Nonce N)); b symkeys; Key b analz (spies evsb)]] = Notes Spy (Crypt (prisk V) (Crypt c (Nonce N))) # evsb foo 29 / 37
30 What Is Privacy in E-Voting? Crucial point: privacy is NOT confidentiality of vote But unlinkability of voter and vote In Pro-Verif, done with observational equivalence between swapped votes 30 / 37
31 Privacy in the Inductive Method: aanalz Extract associations from honest agent s messages 31 / 37
32 Privacy in the Inductive Method: asynth inductive set asynth :: msg set set msg set set for as :: msg set set where asynth Build [intro]: [[a1 as; a2 as; m a1; m a2; m Agent Adm; m Agent Col]] = a1 a2 asynth as Build up association sets from associations with common elements. Only pairwise so far! 32 / 37
33 Privacy in the Inductive Method: Theorem Statement theorem foo V privacy asynth: [[Says V Adm { Agent V, Crypt (prisk V) (Crypt b (Crypt c (Nonce Nv))) } set evs; a (asynth (aanalz Spy evs)); Nonce Nv a; V / bad; V Adm; V Col; evs foo]] = Agent V a If a regular voter started the protocol, the corresponding vote and identity are unlinkable. 33 / 37
34 Privacy in the Inductive Method: Proving Process Genericity of steps 2 and 4 yields proof complexity Genericity is natural consequence of respecting guarantee availability Strategy: map components in asynth to possible origins in aanalz Taxonomy of structures of elements in aanalz Divide & conquer 34 / 37
35 Contributions Conference publications: Holistic Analysis of Mix Protocols International Conference on Information Assurance and Security (IAS 2011) Verifying Privacy by Little Interaction and No Process Equivalence International Conference on Security and Cryptography (SECRYPT 2012) Workshop talk: Electronic Voting Protocol Analysis with the Inductive Method 2011 miniworkshop on Security Frameworks (mwsf11) 35 / 37
36 Conclusions Flexibility of Inductive Method confirmed but limitations related to message datatype extension Very different approach from most used tools (ProVerif, Scyther) hence potential for complementarity! 36 / 37
37 Future Work Focus on the e-voting part of the work Need stronger association synthesis proof complexity challenge Analyse more recent e-voting protocols Article on AIBS chapter Long-term goal: reengineer message datatype completely for broader primitive support 37 / 37
Electronic Voting Protocol Analysis with the Inductive Method
Electronic Voting Protocol Analysis with the Inductive Method Introduction E-voting use is spreading quickly in the EU and elsewhere Sensitive, need for formal guarantees Inductive Method: protocol verification
Verifying security protocols using theorem provers
1562 2007 79-86 79 Verifying security protocols using theorem provers Miki Tanaka National Institute of Information and Communications Technology Koganei, Tokyo 184-8795, Japan Email: [email protected]
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Formal Methods in Security Protocols Analysis
Formal Methods in Security Protocols Analysis Li Zhiwei Aidong Lu Weichao Wang Department of Computer Science Department of Software and Information Systems University of North Carolina at Charlotte Big
Verifying the SET Purchase Protocols
Verifying the SET Purchase Protocols Giampaolo Bella Univ. of Cambridge Fabio Massacci Univ. of Trento Lawrence C. Paulson Univ. of Cambridge November 2001 Abstract The Secure Electronic Transaction (SET)
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting Denis Frédéric Butin B.Sc., M.Sc. A dissertation submitted to Dublin City University in fulfilment of the
How to Formally Model Features of Network Security Protocols
, pp.423-432 http://dx.doi.org/10.14257/ijsia How to Formally Model Features of Network Security Protocols Gyesik Lee Dept. of Computer & Web Information Engineering Hankyong National University Anseong-si,
How to prove security of communication protocols?
1/37 Introduction on security protocols Modeling Verification Towards cryptographic guarantees How to prove security of communication protocols? Véronique Cortier, LORIA - CNRS, Nancy Colloquium Morgenstern,
Le vote électronique : un défi pour la vérification formelle
Le vote électronique : un défi pour la vérification formelle Steve Kremer Loria, Inria Nancy 1 / 17 Electronic voting Elections are a security-sensitive process which is the cornerstone of modern democracy
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract)
Analysis of Security Requirements for Cryptographic Voting Protocols (Extended Abstract) Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey [email protected] Abstract Electronic voting
Analysis of a Biometric Authentication Protocol for Signature Creation Application
Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
How To Verify A Bluetooth Device Pairing With A Human Eye Oracle
Formal Analysis of Authentication in Bluetooth Device Pairing Richard Chang and Vitaly Shmatikov The University of Texas at Austin Abstract. Bluetooth is a popular standard for short-range wireless communications.
Modeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt [email protected] Paper and slides available
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Security Analysis of (Un-) Fair Non-repudiation Protocols
Security Analysis of (Un-) Fair Non-repudiation Protocols Sigrid Gürgens and Carsten Rudolph Fraunhofer Institute for Secure Telecooperation SIT Rheinstrasse 75, D-64295 Darmstadt, Germany {guergens,rudolphc}@sit.fraunhofer.de
A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)
A New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract) Zhe Xia University of Surrey [email protected] Steve Schneider University of Surrey [email protected] May 25, 2006 Abstract
Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext
Part 2 Plaintext M Encrypt with public key E(M, K) Ciphertext Plaintext M D(E(M, K),K ) Decrypt with private key E(M, K) Public and private key related mathematically Public key can be published; private
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
A Draft Framework for Designing Cryptographic Key Management Systems
A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Verification and Validation Issues in Electronic Voting
Verification and Validation Issues in Electronic Voting Orhan Cetinkaya 1, and Deniz Cetinkaya 2 1 Institute of Applied Mathematics, METU, Ankara, Turkey 2 Computer Engineering, METU, Ankara, Turkey [email protected]
Technical report: SeVe implementation
Technical report: SeVe implementation Luu Anh Tuan 1, Jun Sun 2, Yang Liu 1, and Jin Song Dong 1 1 School of Computing, National University of Singapore {tuanluu,liuyang,dongjs}@comp.nus.edu.sg 2 Singapore
Secure Electronic Voting
7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Computer Security. Draft Exam with Answers. 2009.
Computer Security Draft Exam with Answers. 2009. Please note that the questions written here are a draft of the final exam. There may be typos in the questions that were corrected in the final version
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
A Search-Based Framework for Security Protocol Synthesis
A Search-Based Framework for Security Protocol Synthesis Hao Chen Submitted for the degree of Doctor of Philosophy The University of York Department of Computer Science April 2007 For My Mum and Dad 献
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
A STRUCTURED APPROACH TO NETWORK SECURITY PROTOCOL IMPLEMENTATION
A STRUCTURED APPROACH TO NETWORK SECURITY PROTOCOL IMPLEMENTATION a dissertation submitted to the department of computer science, faculty of science at the university of cape town in fulfillment of the
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Computational Soundness of Symbolic Security and Implicit Complexity
Computational Soundness of Symbolic Security and Implicit Complexity Bruce Kapron Computer Science Department University of Victoria Victoria, British Columbia NII Shonan Meeting, November 3-7, 2013 Overview
Module: Applied Cryptography. Professor Patrick McDaniel Fall 2010. CSE543 - Introduction to Computer and Network Security
CSE543 - Introduction to Computer and Network Security Module: Applied Cryptography Professor Patrick McDaniel Fall 2010 Page 1 Key Distribution/Agreement Key Distribution is the process where we assign
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Table: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Voucher Web Metering Using Identity Management Systems
Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher
Security for Ubiquitous and Adhoc Networks
Security for Ubiquitous and Adhoc Networks Mobile Adhoc Networks Collection of nodes that do not rely on a predefined infrastructure Adhoc networks can be formed merged together partitioned to separate
ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo
ZQL Work in progress a cryptographic compiler for processing private data George Danezis Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo Microsoft Research and Joint INRIA-MSR Centre Data
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
An Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog [email protected] 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun ETH Zurich, Switzerland Email: {patrick.schaller,benedikt.schmidt,david.basin,srdjan.capkun}@inf.ethz.ch
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
The Concept of Trust in Network Security
En White Paper Date: August 2000 Version: 1.2 En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
CSG 399 Lecture. The Inductive Approach to Protocol Analysis p.1
The Inductive Approach to Protocol Analysis CSG 399 Lecture The Inductive Approach to Protocol Analysis p.1 Last Time CSP approach: Model system as a CSP process A specification is a property of traces
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
