Silent Circle Instant Messaging Protocol Protocol Specification
|
|
|
- Meryl Henry
- 10 years ago
- Views:
Transcription
1 Protocol Specification Authors: Vinnie Moscaritolo, Gary Belvin, Phil Zimmermann Date: December 5, 2012 Version: 1.0
2 Table of Contents Introduction!... 3 High-level SCIMP features!... 4 Basic Protocol Overview!... 5 Key Agreement! Message Encryption! Protocol Details! Appendix A: Document History! References.! Page 2 of 26
3 Introduction Silent Circle Instant Messaging Protocol (SCIMP) enables you to have a private conversation over instant message transports such as XMPP (Jabber). You could argue that the world doesn't really need another instant message protocol, but the existing protocols didn't have all of the features we wanted, or had unnecessary complexity. SCIMP draws from a number of related protocols. In designing SCIMP, we have drawn many ideas from: ZRTP: Media Path Key Agreement for Unicast Secure RTP [ZRTP] OTR: Off The Record [OTR] SSMS: Secure Short Message Service [BELV] Cryptocat: The Cryptocat Project [NADM] SCIMP provides strong encryption, perfect forward secrecy and message authentication. Further, we have incorporated many NIST-approved methods and protocols into its design including: Elliptic Curve Diffie Hellman (ECDH), NIST A Counter with CBC-MAC (CCM), NIST C Key Derivation, NIST Secure Hash Standard, FIPS Advanced Encryption Standard (AES), FIPS 197 While it is not our immediate intent to FIPS-140 validate the SCIMP library, we have experience with that process and the overall design is not incompatible with that goal. We have also optionally added the Skein family of hash and message authentication function as a cipher suite. Page 3 of 26
4 The protocol is placed completely into the public domain, and the implementation code is open source. It is designed and written by Silent Circle, LLC. High-level SCIMP features SCIMP has a number of features: Easily analyzed, easily implemented. This was important to us, it s one thing to put our code for open source, but it is next to useless if the code is difficult to analyzed and build. Relatively few options. Options are both good and bad in a crypto protocol. If there are too few of them, then the protocol can't change with the times. If there are too many, the protocol is hard to build, test, and vet. NIST-vetted crypto primitives. While we don't always want to limit ourselves only to that suite, NIST selection and documentation of crypto primitives is a great place to start, so we did. Full 128-bit security. SCIMP is built to have a minimum of 128-bit security through-and-through. Simple, integrated authentication. All communications have the problem of how to authenticate to your partner the first time you talk, to reject man-in-the-middle and other eavesdroppers. SCIMP uses simple mechanisms that can integrate with voice communication and share that authentication. Designed for mobile devices Page 4 of 26
5 After examining the popular text encrypting protocols we discovered that they had a number of shortcomings when employed over mobile devices. SCIMP has been designed for use with mobile devices from the beginning. Basic Protocol Overview A lot of the SCIMP design derives from ZRTP. The key agreement protocol employs an ephemeral Elliptic Curve Diffie-Hellman (EC-DH) key agreement to establish a shared secret without invoking a trusted third-party. Authenticity is provided by key continuity using hash commitments of a shared secret, similar to ZRTP and optionally a verbal form of user authentication. Together, key continuity and user authentication prevent man-in-the-middle attacks from going unnoticed. The data messages are protected with authenticated encryption using Counter with Cipher Block Chaining-Message Authentication Code (CCM), as defined in NIST Special Publication SP800-38C. Key Negotiation The Key Agreement Protocol for SCIMP establishes an ephemeral shared secret using a minimal set of messages. SCIMP uses the Elliptic Curve Diffie-Hellman (ECDH) primitive for shared secret computation, with key continuity and one-time verbal authentication for man-in-the-middle detection. Page 5 of 26
6 SCIMP has the advantage of being completely peer-to-peer. There is no need for third parties and you don t have to worry about preventing accidental exposure of long term secrets. SCIMP begins with the initiator sending a hash commitment to the responder on a freshly generated ECDH public key. The responder generates and sends back his public key, without knowing the initiator s public key. Because the initiator also generated her public key without knowing the responder s key, an adversary was prevented from controlling the result of the Diffie-Hellman computation. Hashes of a cached secret are also included in the first two messages. The cached secret is a bit of key material saved from previous executions of the protocol, if applicable (in the absence of a cached secret a random value is sent). The two parties can use this to determine if they have shared key material that matches. Because someone attempting a man-in-the-middle attack wouldn t know or have access to this shared key material, it provides both parties a way to identify if someone is attempting to impersonate the other. The last step of SCIMP involves sending a message authentication code on a known value to the other party, proving that the protocol completed successfully and that the initiator has access to her private key. Once this has been confirmed, both parties refresh their cached secret with a new value derived from the freshly computed shared secret. This action breaks the advantage of an adversary who may have previously compromised cached secrets. As soon as an authentic key agreement takes place, a new cached secret is generated and secrecy is restored to the protocol. Page 6 of 26
7 Once SCIMP has completed, a Short Authentication String (SAS) is displayed to the user to verify the absence of a man-in-the-middle attack. Due to key continuity, the user may verify the SAS with the other party at any time. Using a phone to contact the other party, for example, the user can gain confidence in the identity of the other party based on a number of clues using standard human interaction. An attacker would need to duplicate all these clues when the two parties were checking the SAS and remain undetected while leaving the rest of the conversation undistorted in order to be successful. Bob <Initiator> Alice <Responder Commit Version, Options, H(Pki), Hcs Pkr, Hcs DH1 DH2 Pki, MAC MAC Confirm Data SeqNum, CCM(Data, MsgIndex), Tag Data Conclude (optional) SeqNum, MAC(MsgIndex) Conclude (optional) Figure 1: SCIMP Protocol Diagram Page 7 of 26
8 Algorithms and Ciphers The SCIMP initiator specifies what suite of algorithms to use in the commit message. If the responder does not support the algorithms requested, the responder ignores that commit message. The responder can send his own commit message, specifying a different suite of algorithms to use, starting the process over. Table 1 describes the options and their meanings. Suite Hash KDF/MAC Cipher Public Key 1 SHA-256 HMAC/SHA-256 AES-128 ECC SHA-512/256 HMAC/SHA-512 AES-256 ECC SKEIN-512/256 SKEIN-MAC-512 AES-256 ECC-384 Table 1: SCIMP Cipher Suites Hash Commitment The hash commitment forces the adversary to select a public key without knowing the other party s key. This restricts the adversary to one attempt at finding a collision in the short authentication string (SAS), thus allowing the SAS to be much shorter than it otherwise would need to be. Without the hash commitment, the adversary could acquire the public keys for his two victims before searching for his own pair of keys that would result in an SAS collision. Such a collision would allow the adversary to set up two agreements that generated the same SAS string on both victim devices for a successful and undetected man-in-the-middle attack. Page 8 of 26
9 This attack is restricted in SCIMP by forcing the adversary to select a public key prior to knowing the public key of the other party. Without the other key, the adversary cannot predict what the SAS value will be, and is forced to make a single blind guess. The hash commitment Hc is checked when the initiator sends his public key in DH2 (see Figure 1). If the check fails, a man-in-the-middle attack is in progress. The user is warned, and the protocol stopped. The hash commitment is performed on the Pki as it is sent in the DH2 message, using network byte order with BER encoding. Hc = H(Pki) (512 bits) (1.1) Commit Contention Two end points may attempt to initiate a key negotiation at the same time. Each end point may send the other a commit message before receiving the commit message of the former. The protocol will flag an error and it is up to the application to decide what to do. One way this contest can broken is to compare the hash values of the hash commitment in big endian integer format, and discarding the message with the lower value. The side that sent the commit with the higher value becomes the initiator and the other side, the responder. Cached Secret Comparison Each device stores a long term cached secret for each party it has successfully executed the protocol with in the past. These cached secrets are tied into the key derivation function to achieve key continuity. Key continuity gives us confidence that the user with which are communicating today is the same person with which we communicated last week. Key continuity has been used in a number of protocols including SSH[Gut08]. To determine if two parties have cached secrets (cs), each party sends a non-invertible hash of their cached secret to the other. The initiator does this in the commit message, Page 9 of 26
10 and the responder includes it in the DH1 message. If no cached secret is available, a random value is substituted for cs to avoid leaking information about the cache state. Hcsi is sent in the commit message and Hcsr is sent in DH1. To further avoid leaking information about the state of the cached secret, the MAC is computed on a salt available in the commit and DH1 messages. Hcsi = MAC(cs,H(Pki) Initiator ) (First 64 bits) (1.2) Hcsr = MAC(cs,H(Pkr) Responder ) (First 64 bits) (1.3) These values are computed locally and compared against the values received from the other party to determine the presence of a cached secret. If the hashes match, the cached secret exists and is shared between both parties. If they do not match, a null is used in place of cs in the key derivation function. If a device stores a cached secret for a particular party, the cached secret comparison is expected to succeed. If the comparison fails when a cached secret is available, then one of the parties may have lost their secrets due to a device reset, or there may be a man-in-the-middle (MiTM) attack in progress. In the case of a mismatch, the user must be warned that a MiTM attack may be underway, and advise the user to verify the short authentication string as soon as possible to verify that the MiTM is not present. If a mismatch occurs, the cache is not updated until after the user has verified the short authentication string (SAS) with the other party. The user should be warned of this condition on every key agreement until the condition has been resolved. When no attacker is suspected, the cached secret cache is updated with a new value after a successful key agreement has been confirmed by receipt of confirmation MACs cs = KDF(Z, RetainedSecret, Context, 256) (1.4) Because previous cached secret key material is mixed into the key derivation, a successful attack on key negotiation must involve both a compromise of the cached Page 10 of 26
11 secrets on the device as well as a man-in-the-middle attack on the next key negotiation. If the adversary misses just one key negotiation, the cached secrets are replaced with fresh, secret values and the protocol self-heals. Short Authentication String (SAS) The Short Authentication String (SAS) is the first 20 bits of the SAS hash. The commit message includes a designation of what SAS rendering scheme to use: 0x01 The SAS is displayed to the user as a 4 character Base32 string using the encoding described in section of RFC 6189[ZJC11]. That encoding scheme is designed for ease of human use. The output alphabet is all lower case, excludes characters that are easily confused, and padding characters are left out. 0x02 The 4 characters of the prior scheme are displayed to the user using the NATO phonetic alphabet as an aid to auditory clarity in verbal confirmation. If the end-point interface is not large enough for NATO words, however, this option downgrades to the first option. 0x03 The SAS is displayed to the user as 6 hexadecimal letters Ksas =KDF(Kdk2, SAS,Context,20) (1.5) Silent Circle recommends that users make use of an alternative method to establish the identity of the receiving party and verify that the user has the same SAS value. A phone call would be sufficient for this purpose since confidence building cues such as voice timbre and manner of speech are present. These cues make it difficult for an adversary to convincingly impersonate the other party without being detected. If the two parties are physically co-located, they may even be able to compare their short authentication strings by placing their devices side-by-side. Page 11 of 26
12 Because the verification of the SAS cannot be automated, the security of SCIMP is dependent on the initiative of the user. This opens a window of vulnerability for lackadaisical users as an adversary may successfully perform a man-in-the-middle attack without detection until the first comparison of the SAS. This vulnerability is offset by several considerations. The first is that the key continuity properties require the presence of the adversary during every key agreement. An absence during just one key negotiation would alert the user that key continuity has been broken, and subsequent key negotiations would be secure against undetected man-in-the-middle attacks. The second implication from key continuity is that a successful verification of the SAS means that all previous key agreements have succeeded without interference from the adversary. Partial Public Key Validation Before using the public keys in DH1 and DH2 for computation, the keys must be verified. Public keys must have the correct modulus and not be the point at infinity. Full validation would also check that the public key is in the same subgroup as our ECC domain parameter curve, but this is an expensive operation for resource constrained devices. The validation routing is performed as specified in of NIST Special Publication A[BJS07]. If any of the checks fail, the user should be alerted that a weak key attack is under way, and the protocol must be terminated. 1. Q must not be the point at infinity. 2. Q must be in the valid range of the elliptic curve group. Key Agreement The shared secret is computed using the process described in section of NIST Special Publication A[BJS07]. Page 12 of 26
13 Once the public key from the other party has been verified, the Elliptic Curve Cryptography Cofactor Diffie-Hellman (ECC CDH) Primitive is used to compute the shared secret Z as specified in section of NIST SP A. Given (q, F R, a, b, G, n, h)1 as domain parameters, da, one s own private key and QB, the other party s public key, compute Z: P = hdaqb (3.8) Z = xp (where xp is the x coordinate of P) (3.9) The next task is to convert Z, which is a field element, into a random bit string suitable for keying material. A naive approach might be to apply a hash function to Z, but this is problematic for two reasons: Hash functions are not guaranteed to have Pseudo- Random Function (PRF) properties, only collision and pre-image resistance. Secondly, hash functions need to be computed on random values in order to guarantee the randomness of their outputs. If the input is not random, the output of a static hash function can be easily reversed. Therefore, Krawczyk[Kra10] and a draft Special Publication C[Che10] from NIST separate randomness extraction and key expansion into two separate steps. Extract Z is transformed into a random key derivation key Kdk using a MAC keyed with a salt value. KAPS uses a hash of all the messages sent and received Htotal for the salt. Htotal = H(commit DH1 Pki ) bit hash (1.10) Kdk = MAC(Htotal,Z) - where Z is the DH of Pki and PKr (1.11) Enhance Before the key derivation key is ready to be expanded for application specific purposes, the cached secret must be mixed in. The mixing is performed using the same function as the expand step, with cached secrets being used in the context field. Kdk2 =MAC(Kdk,1 MasterSecret 0x00 MasterContext 256) (1.12) Page 13 of 26
14 MasterContext = AlgorithmID InitInfo RespInfo SuppPubInfo SuppPrivInfo (1.13) Where AlgorithmID describes the algorithm: SCimp-ENHANCE InitInfo is identifying information for the initiator: strlen(initiator s JID) (Initiator s JID) RespInfo is identifying information for the responder strlen(responder s JID) (responder s JID) SuppPubInfo is a nonce for which Htotal will suffice. SuppPrivInfo is the cached secret (if it exists): len(cs) cs. If no cached secret exists for this agreement, the length of cs is 0 followed by nothing: 0 Expand Finally, Kdk2 is expanded using the KDF for SCIMP to generate a separate master session key for each direction of the secure symmetric conversation. The context in this case is a simplified version of the master context. KItoR =KDF(Kdk2, InitiatorMasterKey,Context,256) (3.14) KRtoI =KDF(Kdk2, ResponderMasterKey,Context,256) (3.15) The SCIMP key derivation function is defined as the L left most bits of the MAC computed in the following way, where L must not exceed the size of the MAC function s output: KDF(K, Label, Context, L) = MAC(K, Counter Label 0x00 Context L) (3.16) K is a secret random bit string. Page 14 of 26
15 L is the length in bits of the output key material encoded as a 4 octet integer. Label identifies the purpose of the output key material. Counter is required by NIST Special Publication [Che09] and is always 1 since we limit the output length of the KDF to be less than the output length of the MAC. The counter is encoded as a 4 octet integer. Context is a binary string that ties the output key material to the particular situation in which it is being used. Context = InitiatorJIDInfo ResponderJIDInfo SupPubInfo InitiatorJIDInfo is identifying information for the initiator: len(initiator JID) Initiator JID. ResponderJIDInfo is identifying information for the initiator: len(responder JID) Responder JID SuppPubInfo is a nonce for which Htotal will suffice. As soon as intermediate keys Kdk, Kdk2, and other intermediate key material is no longer needed, or if there is an error they must be erased from memory. Commit DH1 PKi Hash Expand Ksnd Other Party's EC Pub Key Salt (256) Expand Krcv EC-DH ANSI X9.63 Z (384) Randomness Extraction Expand KmacI (256) Our EC Priv Key Kdk (256) Kdk2 (256) Expand KmacR (256) Cached Secret Enhance Expand SAS (20) Expand CS1 Expand Ircv (64) Expand Isnd (64) Page 15 of 26
16 Key Confirmation The last step in the protocol involves giving the other party assurance that the protocol completed successfully and that he is in possession of the correct symmetric key. This is accomplished by sending a MAC computed on a known value under a key derived from Kdk2. The initiator s confirmation is sent in the DH2 message, and the responder s confirmation is sent in the Confirm message. KmacI =KDF(Kdk2, InitiatorMACKey,Context, cipherlen) (3.18) KmacR =KDF(Kdk2, ResponderMACKey,Context, cipherlen) (3.19) maci = MAC(KmacI, Htotal ) (first 64 bits) (3.20) macr= MAC(KmacR, Htotal) (first 64 bits) (3.21) After the key confirmation has been successfully validated, parties update their cached shared secret cs. (Provided a man in the middle attack was not suspected as noted in section 3.7) The previous shared secret is erased and replaced with the new shared secret as calculated in equation Page 16 of 26
17 Message Encryption SCIMP encrypts the actual message payload using AES in CCM block cipher mode. The CCM mode of operation defines an authenticated encryption scheme, the security of which rests on a single cryptographic primitive, the block cipher. CCM is also attractive due to its ability to authenticate cleartext header data in addition to cipher-text data. Each message is encrypted with a distinct key. The actual key material is split in half and the upper is used as the key while the lower bits are used for the Initialization Vector. A sequence number is also fed to the CCM algorithm to limit replay protection. Initial Message Index SCIMP uses the KDF to compute the initial sequence number for the CCM encryption process. Since this function is only called once for any master key, the static nonce is appropriate. sessionid = H( strlen(initiator JID) (initiator JID) strlen(responder s JID) (responder s JID) ) isnd = KDF(Kmaster, InitiatorInitialIndex, sessionid 0, 64) ircv = KDF(Kmaster, InitiatorInitialIndex, sessionid 0, 64) Each addition index number is an increment of the previous. isnd1 = isnd + 1; Forward Secrecy SCIMP uses distinct keys to encrypt each message and in each direction. The initial Ksnd and Krcv keys are created from the expansion process as described above. SCIMP then derives further key material using a hash based key derivation function that is compliant with NIST Special Publication [Che09] section 5.1. Since each key is computed from the previous using the non-invertible key derivation function the result is a chain of keys that protects the security of prior messages when a Page 17 of 26
18 single key is compromised. Keys are also erased from memory as soon as they are no longer needed to prevent unneeded leakage in the event that a device is forensically analyzed. Each key is derived by hashing the previous key with the session identifier as well as the message index. The initial message index is computed from the key expansion process K0 = KDF(Kmaster, MessageKey,session identifier i0) Kn = KDF(Kn 1, MessageKey, session identifier in) Where i0 and in correspond to the appropriate index for that direction (isnd and ircv). Kmaster KDF i0 KDF K0 i1 KDF K1 i2 KDF K2 SCIMP Message Key Derivation Page 18 of 26
19 Padding and CCM The data passed to CCM is padded. Messages shorter than 32 bytes are padded to 32 bytes and messages longer than 32 are padded to the next multiple of 16. The actual byte used to pad is the number of bytes added to pad. For example a message of 9 bytes long will have an addition 21 bytes of 0x15 added. Page 19 of 26
20 Example Message Processing 1. Bob generates a ECDH key pair and computes and send the hash Commit Packet. 2. Alice Receives the hash commitment from the initiator and generates her own ECDH key pair, sends the public key in a DH1 message 3. Bob receives DH1 message. Verifies that shared secrets match as expected. If not, warn user of a man-in-the-middle attack. Verifies that the responder s public key is valid using the algorithm specified Computes master and session keys. Sends DH2 with confirmation MAC. 4. Alice Receives the initiator s DH2 public key. Verifies the hash commitment received earlier. Verifies that the shared secrets match as expected. If not, warn the user of a man-in-the-middle attack. Verifies the initiator s public key. Compute master and session keys. Verifies the confirmation code. Update shared secrets. Sends her confirmation code in a confirm packet 5. Bob receives and verifies the confirmation code. Updates shared secrets. and is read to send messages. Page 20 of 26
21 !! Bob <Initiator> Alice <Responder Commit Version, Options, H(Pki), Hcs Pkr, Hcs DH1 DH2 Pki, MAC MAC Confirm Data SeqNum, CCM(Data, MsgIndex), Tag Data! Page 21 of 26
22 Protocol Details SCIMP can be transported over a variety of wire formats. SCIMP support JSON, XML or a more compact binary format. The version of SCIMP the Silent Circle uses encodes the protocol as JSON packets wrapped in a Rad64. AS mentioned above SCIMP uses 4 kinds of packets to establish the secret keys: commit, dh1, dh2 and confirm. Commit is the start of the keying process, where the initiator creates a ECC key pair but only send a hash of the public key, along with some HMAC information that might indicate if they have had a shared secret in the past. { } "commit": { "version": 1, "ciphersuite": 1, "sasmethod": 1, "Hpki": "s18c+pku2b81vyspfnrsvimieziz5i0yrbqxpkdzgso=", "Hcs": "bx/scjjqu1s=" } When the recipient receives a Commit, it check packet for valid options and then creates it's own ECC key and responds by sending the public key back to the initiator with a DH1 packet. It also includes a HMAC of a previously shared secret. { "dh1": { "PKr": "MGwDAgcAAgEwAjEAsI23okNBcGV1qy0RsliSKBpQNf3095weuQXsfcur4s0r9+hpA3jlg75RIcTYiPByAjAto kuw22ofhab63zidmde3an06agjact4ywmy3ywywdjrkirkivchadxfupjon/a0=", "Hcs": "Sgd9nFcLvYs=" } } Page 22 of 26
23 At this point the Initiator has enough information to complete the ECC - Diffie Hellman process, and derives both the sending and receive communication keys. The initiator then replies with a DH2 packet which contains a copy of the public key it previously send a hash of and a HMAC of the current shared secret. { "dh2": { "PKi": "MG0DAgcAAgEwAjEAmS2t3VvYXkSYLWuZ4vDQfJpL2VrCxOrkj2E4v/ 6EOxfk9USrdLnVUIhHbSmVpD5vAjEA93WVAfM9STK3zPV2M4NuJlcrGlvCD/ CVhClxtpua6lEBHi5E5bPOTrFszlmrF7qd", "maci": "KeO29YxeB80=" } } The recipient uses the DH2 information to complete it's ECC - Diffie Hellman process and derives a copy of the communications keys also. To ensure that both sides are on the same page, the recipient replies with a CONFIRM packet which contains an HMAC of the new shared secret. { } "confirm": { "macr": "/jo+3bz8dpw=" } Once a the keys are established, SCIMP can then send the user message using a DATA packet. The actual message is encrypted using AES in the Counter with CBC- MAC (CCM) mode. This provides us a message authentication code of both the message and the sequence number. { "data": { "seq": 51323, "mac": "ykrzxqvcr4lpj2/yl38c+q==", "msg": "s8o4ad8qn45uxauvapawfq16ns2jev0d3adygrecnxw6sts6iw/ dx8om6vaugpukvrg4wpbguhvbqqv91aq/sw==" } } Page 23 of 26
24 In order to ensure that the messages arrive intact over protocols such as XMPP the JSON packets are encoded in rad64 with a header or "?SCIMP:" and terminated with a period. For example when the last data packet goes over the XMPP, it actually looks like. Example SCIMP Message <message type="chat"from='[email protected]' to='[email protected]' id="0ff6cf98-32fe-4eed-9def-d66a0e50ea8f"><body/><x xmlns=" silentcircle.com">? SCIMP:ewogICAgImRhdGEiOiB7CiAgICAgICAgInNlcSI6IDE1MDcyLAogICAgICAgICJtYWMiOiAiZlp YYURlQ1ljVTA9IiwKICAgICAgICAibXNnIjogIkloT051Sm9kK0Fjb09KQ1prZ0xHQXliSmJjbC9WNzhl cmmrsfy4k1fhcuj2cedlb2raswzwntrkvwluu2g0n0lztjforkjoaxbjtvdubwlsmxvtbi9pcg5rvk8rd VJZdUJuQjdpZXZEK1pZQzBYV0hHQWQ3WWJtOWRsYkpSd0oyIgogICAgfQp9Cg==.</x></message> Page 24 of 26
25 Appendix A: Document History Date Rev Author Change 6/1/12! 0.1 vin First complete draft. 6/5/ vin Updated API names to start with SCimp 6/19/ vin exchange CCM for GCM 6/20/ vin SCIMP messages are Rad64 with SCIMP header 6/21/ vin minor protocol text corrections 7/16/ vin Added message ID to SCimpProcessPacket() 8/21/ vin htotal needed to be a 256 bit hash 8/31/ vin minor corrections to hash lengths 10/19/ vin cleanup and split API into separate doc 10/22/ vin corrections, kudo JimB 12/5/ vin Updated authors Page 25 of 26
26 References. [BELV] Gary Belvin. A Secure Text Messaging Protocol, John Hopkins University. (May 2001) [CER] CERT. MSC10-J. Limit the lifetime of sensitive data. [Che09] Lily Chen. NIST Special Publication Recommendation for Key Derivation Using Pseudorandom Functions (revised). (October), [Che10] Lily Chen. DRAFT NIST Special Publication C Recommendation for Key Derivation through Extraction-then-Expansion. (September), [Gut08] Gutmann. Key Management Through Key Continuity(KCM). Internet Draft, [Jak] J. Jonsson, On the Security of CTR + CBC-MAC, in Proceedings of Selected Areas in Cryptography SAC, 2002, K. Nyberg, H. Heys, Eds., Lecture Notes in Computer Science, Vol. 2595, pp , Berlin: Springer, [800-38B] Draft NIST Special Publication B, Recommendation for Block Cipher Modes of Operation: the CMAC Authentication Mode. U.S. DoC/NIST, October Available at [Krh09] Jan Krhovjak. Cryptographic random and pseudorandom data generators. PhD thesis, Masaryk University, [NADM] Nadim Kobeissi, CryptoCat, ( [OTR] Ian Goldberg,Nikita Borisov Off-the-Record Messaging Protocol version 2. ( [RAD64] Wikipedia, Base64 [ZRTP (RFC 6189)] P. Zimmermann, A. Johnston, and J. Callas. ZRTP: Media Path Key Agreement for Unicast Secure RTP. RFC 6189, April ( Page 26 of 26
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Suite B Implementer s Guide to NIST SP 800-56A July 28, 2009
1. Introduction Suite B Implementer s Guide to NIST SP 800-56A July 28, 2009 This document specifies the Elliptic Curve Diffie-Hellman (ECDH) key-agreement schemes from NIST SP 800-56A: Recommendation
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version 3.0.0.1, 3.0.0.2 October 22, 2012
RSA BSAFE Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy Version 3.0.0.1, 3.0.0.2 October 22, 2012 Strong encryption technology for C/C++ developers Contact Information See our Web sites
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
How to Send Stealth Text From Your Cell Phone
anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
KeyStone Architecture Security Accelerator (SA) User Guide
KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Recommendation for Existing Application-Specific Key Derivation Functions
NIST Special Publication 800-135 Revision 1 Recommendation for Existing Application-Specific Key Derivation Functions Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T
Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:
Designing Hash functions and message authentication codes Reviewing... We have seen how to authenticate messages: Using symmetric encryption, in an heuristic fashion Using public-key encryption in interactive
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
RFB 5.0 Protocol Analysis Overview and the RA4 cipher suites
RFB 5.0 Protocol Analysis Overview and the RA4 cipher suites Nicholas Wilson RealVNC Ltd [email protected] July 14, 2015 Contents 1 Introduction to RFB 5.0 2 2 Introduction to VNC Cloud 3 3 Overall
SSL: Secure Socket Layer
SSL: Secure Socket Layer Steven M. Bellovin February 12, 2009 1 Choices in Key Exchange We have two basic ways to do key exchange, public key (with PKI or pki) or KDC Which is better? What are the properties
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
National Security Agency Perspective on Key Management
National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
Information Security
SE 4472 / ECE 9064 Information Security Week 11: Transport Layer Security (TLS): Putting it all together Fall 2015 Prof. Aleksander Essex Security at the Transport Layer Where we started in this course:
Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System DANIELE TRABALZA
Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System DANIELE TRABALZA Master s Degree Project Stockholm, Sweden June 2012 Abstract Smartphones are
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
CS155. Cryptography Overview
CS155 Cryptography Overview Cryptography Is n A tremendous tool n The basis for many security mechanisms Is not n The solution to all security problems n Reliable unless implemented properly n Reliable
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Authenticated encryption
Authenticated encryption Dr. Enigma Department of Electrical Engineering & Computer Science University of Central Florida [email protected] October 16th, 2013 Active attacks on CPA-secure encryption
Network Security Protocols
Network Security Protocols Information Security (bmevihim100) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS)
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
A Survey of the Elliptic Curve Integrated Encryption Scheme
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
