Secure Large-Scale Bingo
|
|
|
- Paulina Cole
- 10 years ago
- Views:
Transcription
1 Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E Tarragona, Catalonia, {anmartin, fsebe, jdomingo}@etse.urv.es Abstract When designing a secure Internet version for keno or bingo for a large group of players, a multicast communication model is likely to be used for source-toplayers communication. For a large group of players, this can potentially overwhelm the source, a problem which is known as implosion. This paper presents a scheme for large-scale bingo which avoids implosion in the many-to-one communication between the players and the hall. The resulting scheme aggregates information using a probabilistic public-key additive privacy homomorphism and guarantees the security of communications. Keywords: Virtual gaming, Multicast, Many-toone communications. provide the source with information about who is interested in the upcoming session. With this information, an optimal multicast tree is built. Using multicast transmission for one-to-many communication results in a dramatical reduction of the bandwidth and memory used in intermediate routers. 1.1 The implosion problem For a large group of players, reverse many-to-one communication can potentially overwhelm the source, a problem which is known as implosion. In addition to requiring solutions to implosion, some many-to-one applications also have security requirements. 1 Introduction With the widespread use of Internet, plenty of virtual casinos offer electronic versions of classic games such as roulette, blackjack, etc. Some of these are large group games, like keno or bingo. When designing a secure Internet version for keno or bingo for a large group of players, a multicast communication model is likely to be used for source-to-players (one-to-many) communication. A multicast network consists of one source sending a single stream of data to a set of multicast routers. The data stream floods the multicast tree in order to efficiently reach every customer subscribed to the current session. Before a multicast transmission begins, the session is advertised to potential customers. Replies are made by means of protocols such as IGMP, which This work has been partly supported by the Spanish Ministry of Science and Technology and the European FEDER Fund under project TIC C03-01 STREAMOBILE. 1.2 Contribution and plan of this paper Moving the bingo game from physical casinos to virtual Internet halls requires many-to-one communication between the players and the virtual hall. If the game is played on a large scale, special care must be devoted to avoiding implosion of communications on the side of the virtual hall. This paper presents a scheme for large-scale bingo which avoids implosion in the many-to-one communication between the players and the hall. The resulting scheme aggregates information using a probabilistic public-key additive privacy homomorphism and guarantees the security of communications. Section 2 describes a scheme for sending bits from many receivers to the source. This scheme is used in Section 3, where a secure large-scale Internet bingo is described. In Section 4 the security of the scheme is proven. 1
2 2 Many-to-one transmission in multicast networks In this section, a scheme for sending bits from many receivers to the source via the multicast tree is described. In a multicast scenario there are three parties, which are also involved in the protocol: The source, which multicasts some information to all players in the session. The intermediate routers, which aggregate the information and send it to their parent routers. The players, who receive some information via their multicast connection and can send some information to the source. In this tool, a public-key probabilistic additive privacy homomorphism (PH) is used. A canditate PH for the application described here is [Okam98]. Note that, since a probabilistic cryptosystem is being used, the same cleartext message can result in different encrypted messages. 2.1 The basic construction The construction consists of a set-up protocol to be run before any transmissions are started, and a transmission protocol to be run for each symbol transmission. Protocol 1 (Set-up) 1. The source chooses parameters l, u, where l will be used below and u is the number of users. 2. The source generates 2u intervals as follows: I 1 =[1, 2 l 1] I j =[Ij min,ij max ] = [(2 j 2)(2 l 1)+2 j 1 1, (2 j 1)(2 l 1)+2 j 1 1] for j =2to 2u. 3. The source generates u keys k i, for i =1to u, corresponding to a block cipher (e.g. AES). 4. The source generates a key pair for a probabilistic additive public-key privacy homomorphism such that its cleartext space is CT = {0, 1, 2,,p 1} where p should be larger than 2I2u max +1. After some manipulation, it can be checked that the lower bound on p is p>(2 2u 1)(2 l+1 1) (1) (E.g., for u = 500 users, p should have O(10 3 ) bits.) 5. The source multicasts the public key PK of the PH and I2i 1 min, Imax 2i 1, Imin 2i, I2i max for i =1to u. In addition the source secretly sends k i to each user U i, who should keep this key confidential (storing it in a tamper-resistant device such as a smart card would seem appropriate). After set-up, the normal operation of the scheme consists of many-to-one transmissions of binary symbols. In order to collect a binary symbol from each user, the following four-step protocol is used: Protocol 2 (Many-to-one bit transmission) 1. Transmission request. A challenge message is multicast by the source to all users. This challenge contains a random value v. 2. Message generation. (a) When a user U i receives the challenge message, she computes S 2i 1 = I min 2i 1 + H(v k i ) S 2i = I2i min + H(v +1 k i ) (2) where H is a one-way collision-free hash function yielding an l-bit integer as output. This condition on the output of H ensures that S 2i 1 I 2i 1 and S 2i I 2i, which in turn guarantees that the sequence S = {S j } for j = 1,, 2u is super-increasing. On the other hand, condition (1) ensures that no overflow in CT will occur when adding encrypted terms of the super-increasing sequence over the ciphertext space CT. (b) Next, each U i generates her message as follows: i. If she wants to transmit a 0 bit value, she generates the message M i = E PK (S 2i 1 ) where E PK ( ) stands for the encryption function of the probabilistic additive public-key privacy homomorphism used. ii. If she wants to transmit a 1 bit value, she generates M i = E PK (S 2i )) 2
3 iii. In case of transmitting ternary symbols, a third symbol (other than 0 and 1) could be transmitted if U i sent M i = E PK (S 2i 1 + S 2i ) Finally U i sends M i up to her parent router. 3. Message aggregation. Intermediate routers receive messages from their child routers/users and do the following: (a) Once all expected messages {M i } i have been received, the router aggregates them as M = i M i, where stands for the ciphertext operation of the privacy homomorphism corresponding to cleartext addition. (b) The router sends M up to its parent router. 4. Symbol extraction. When the previous process completes, the source finally receives an aggregated message M, from which the transmitted symbols are extracted as follows: (a) The source constructs the super-increasing sequence S = {S j } for j =1to 2u using, for each user U i, using equations (2). (b) The source decrypts M using its private key to recover a value T which is used to solve the super-increasing knapsack problem [Merk78] and obtain the sequence S = {S a,s b,...,s j } that yields the symbols sent by the users. Specifically, there are four possible cases for each user U i : i. If S 2i 1 S and S 2i S, then U i sent nothing. ii. If S 2i 1 S and S 2i S, then U i sent a bit value 0. iii. If S 2i 1 S and S 2i S, then U i sent a bit value 1. iv. If S 2i 1 S and S 2i S, then this is an error condition in a binary transmission. 3 A secure large-scale bingo 3.1 A description of conventional bingo Conventional, i.e. physical, bingo is played in a large hall. Players meet at the hall and the game begins. In this way, many bingo games are played one after the other. A bingo game proceeds as follows: 1. There are 99 possible bingo numbers: B = {1..99}. Each of these numbers is represented by a ball in a large rotating bin. Each ball is painted with its unique bingo number. 2. Every player receives a bingo card with 15 different numbers. These numbers are distributed in three rows, with five numbers each. 3. An announcer spins the bin and selects a ball (or a computer randomly selects a number). This number is announced to the audience. 4. Then each player checks her card to see whether the announced number appears on it. 5. This is repeated until a bingo or a line are called out. There are two winning configurations: Line. If all the numbers in a row of a card have been selected, its owner calls out line. The game pauses while the card is verified. If a line has been completed, the player receives about 8 percent of the total bet. Then, the game goes on, but nobody else can call out a line. Bingo. When all the numbers on a card have appeared, its owner must call out bingo. The game pauses while the card is verified. If a whole card has been completed, the game ends. Note that the game always ends, because someone will complete a card sooner or later. The above description corresponds to European and, more specifically, Spanish bingo. In other versions of bingo (e.g. American), the winning configurations may vary, but the basic operation of the game stays the same. 3.2 A protocol for secure large-scale bingo An electronic version of the above bingo rules is described next. Let u be the number of players, where u Enrollment The source announces an enrollment period in order to allow new players to join. When a player is interested in joining a virtual bingo hall, she registers to the source using a unicast communication. The parameters used in Protocols 1 and 2 are supplied by the source. This would require sending renewed parameters to players already in the system. 3
4 3.2.2 Game start In conventional physical bingo, cards are generated and supplied by the source. In the electronic version, each player randomly creates her bingo card in the following way: 1. Every player U randomly chooses 15 different numbers from B in order to fill her bingo card C U. These numbers are sorted in ascending order and split in three rows of five numbers each. for l=1..3 L U l = {b l,1,b l,2,b l,3,b l,4,b l,5 } C U = {L U 1, L U 2, L U 3 } 2. The player computes a one-way hash of each line l, in the following way H U l = H(b l,1,b l,2,b l,3,b l,4,b l,5, salt l ) where salt l is a random number, and sends the resulting hash to the source. In this way, the player commits to the selected values. These hash values are sent to the source one bit at a time using Protocol 2. This procedure avoids information implosion at the source. Moreover, no user-dedicated secure connections are needed. 3. The use of Protocol 2 guarantees that the source knows the identity of the new bingo game players, as shown below. 4. Note that during this step, players may perform a micropayment that allows them to play. Otherwise, a subscription model may be used for payment Game operation Once the game has started, bingo numbers are successively and randomly chosen by the source and checked by players, until the game ends: 1. A bingo number b is randomly chosen. This number cannot appear again during the current bingo game (due to bingo rules). b is multicast to every player. 2. Every player checks whether b is in her bingo card. If so, b is marked. 3. A transmission request is multicast by the source to all players. Player U i generates a message M i, according to the following message-to-symbol mapping: S 2i 1 = player has received the number, but has not completed a line or bingo. S 2i = all five numbers of L Ui 0, LUi 1 or LUi 2 have appeared (line). S 2i 1 + S 2i = all numbers of C Ui have appeared (bingo). Messages are sent and aggregated following Steps 3a and 3b of Protocol The source finally receives an aggregated message M, from which the transmitted symbols are extracted. If a user U i has sent a line message, a unicast connection is set up between the source and U i. The latter sends a message to the source containing the bingo numbers of the winning line, and the salt l value used for that line. The source then checks that the hash U i committed to at the beginning of the game corresponds to the sent line. Once all messages from line-winning players have been checked, no more line messages will be accepted (due to bingo rules). If a user U i has sent a bingo message, U i sends to the source the three lines of C Ui and the corresponding salt l values for checking. 4 Security We next state the security properties of our scheme, which are proven below. Property 1 (Confidentiality) If a secure probabilistic additive public-key PH is used in which there is a negligible probability of obtaining the same ciphertext as a result of two independent encryptions of the same cleartext, then an intruder cannot determine the symbol transmitted by a user in Protocol 2. Property 2 (Authentication) If a secure publickey PH and a one-way collision-free hash function with l-bit output are used, the following holds: 1. the probability of successfully impersonating another user when sending a bit value to the source is 2 l ; 4
5 2. substituting a false message M for a legitimate message M M in the current transmission is at least as difficult as impersonation; 3. substituting a message M for a legitimate message M M in future transmissions using information from the current transmission is infeasible. Proof (Property 1): Assume the intruder captures a message M sent by U i during Protocol 2. This message is either E PK (S 2i 1 ), E PK (S 2i ) or E PK (S 2i 1 + S 2i ). Decryption of M is not possible because the PH is secure and the intruder does not have access to the private key. Exhaustive search of the cleartext carried out by M is the other attack strategy to be examined. Now, exhaustive search of the sequence values S 2i 1 or S 2i by encrypting candidate values and comparing the result to M is not feasible because the PH is probabilistic and there is a negligible probability that two independent encryptions of the same cleartext yield the same ciphertext. Therefore, the above comparison (and thus exhaustive search) will fail with overwhelming probability. Proof (Property 2): By the same argument as for Property 1, we need only prove this property for the basic construction. In the impersonation attack, an intruder who wants to impersonate user U i tries to generate a message E PK (S 2i 1 ), E PK (S 2i )ore PK (S 2i 1 + S 2i ), Now, the intruder needs to compute S 2i 1 or S 2i. Each term S j of the super-increasing sequence S is pseudo-randomly chosen within an interval I j containing 2 l integer values. The choice is made using a oneway collision-free hash function of the challenge and the secret key k i unknown to the intruder, as shown in equations (2). Thus, the probability of the intruder randomly hitting S j is at most 2 l. Remark that exhaustive search is not feasible, since there is no way of checking whether the right S j has been hit (there is no way for the intruder to make sure whether the message generated with the candidate S j is correct). A substitution attack can be mounted in the current transmission or in future transmissions: In the current transmission, assume the intruder wants to substitute a false message M for an authentic message M sent by U i, with M M. Without loss of generality, let M = E PK (S 2i ); the intruder wants to transform M into M = E PK (S 2i 1 ) or M = E PK (S 2i 1 + S 2i ). This requires the following steps: i) recover S 2i from M; ii) compute S 2i 1 with knowledge of S 2i ; iii) compute M. Thus, even if decrypting M at step i) was easy (which it is not), solving step ii) is as difficult as mounting a successful impersonation attack (see above). A second possibility is for an internal intruder to use information derived from a current transmission of a message by U i to alter future messages sent by U i. But this is infeasible, because in subsequent executions of Protocol 2, a different superincreasing sequence will be used to encode the messages which does not depend on the current super-increasing sequence (see equations (2)). 5 Conclusion Moving the bingo game from physical casinos to a large-scale virtual scenario requires efficient and secure many-to-one communication between players and the virtual bingo hall. This paper has presented a scheme for large-scale virtual bingo which avoids implosion in the many-to-one communication. The resulting scheme aggregates information using a probabilistic public-key additive privacy homomorphism and guarantees the security of communications. References [Merk78] R. C. Merkle and M. Hellman, Hiding information and signatures in trapdoor knapsacks, in IEEE Transactions on Information Theory, vol. 24, no. 5, pp , [MSEC03] Multicast Security Working Group (MSEC WG). [Okam98] T. Okamoto and S. Uchiyama, A new public-key cryptosystem as secure as factoring, in Advances in Cryptology - EUROCRYPT 98, ed. K. Nyberg, LNCS 1403, Berlin: Springer-Verlag, pp , [Quin01] B. Quinn and K. Almeroth, IP Multicast Applications: Challenges and Solutions, Internet RFC 3170,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania
Schnorr Signcryption Combining public key encryption with Schnorr digital signature Laura Savu, University of Bucharest, Romania IT Security for the Next Generation European Cup, Prague 17-19 February,
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay
Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Chapter 37. Secure Networks
Chapter 37 Network Security (Access Control, Encryption, Firewalls) Secure Networks Secure network is not an absolute term Need to define security policy for organization Network security policy cannot
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Modes of Operation of Block Ciphers
Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
VoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi [email protected] Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
On the Difficulty of Software Key Escrow
On the Difficulty of Software Key Escrow Lars R. Knudsen and Torben P. Pedersen Katholieke Universiteit Leuven, Belgium, email: [email protected] Cryptomathic, Denmark, email: [email protected]
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints
Noname manuscript No. (will be inserted by the editor) Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints David Megías Josep Domingo-Ferrer Received: date / Accepted:
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India [email protected] 2 Director, Dept. of MCA, Sona College
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS
AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS Chang N. Zhang and Qian Yu Department of Computer Science, University of Regina 3737 Wascana Parkway, Regina, SK S4S 0A2 Canada {zhang, yu209}@cs.uregina.ca
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
End-to-end Secure Data Aggregation in Wireless Sensor Networks
End-to-end Secure Data Aggregation in Wireless Sensor Networks Keyur Parmar 1 Devesh Jinwala 2 1 Ph.D Scholar & Senior Research Fellow Department of Computer Engineering SVNIT, Surat, India 2 Professor
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
How To Know If A Message Is From A Person Or A Machine
The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
