4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014

Size: px
Start display at page:

Download "4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014"

Transcription

1 4K Network Security Proposal Discussion with Studios UXTC - Technical Planning Group Sony Electronics 8/10/2014

2 Overview Sony s 4K Network Security Proposal: Our authentication protocol uses certificates checked against a white list that includes additional information for targeted renewability Robustness based on HDCP 2.2 with third party certification Compliance rules that can preclude outputs Outstanding Items: Start-up process for a market need ahead of appropriate licensing and certification DirecTV, Sony and others have expressed a desire to make an announcement at upcoming CES See Phase-in Slides White listing can be a process where content providers could determine their own list of approved devices

3 Authentication

4 Authentication Key Points: Authentication Summary Our proposed authentication approach starts by manufacturers supplying the Device IDs (and minimum software version number) of conforming Ultra High Definition (UHD), e.g. 4K, TVs to the service provider for inclusion in a list, which will be referred to as the authenticated white list. Inclusion in the white list can be based on criteria negotiated with the service and content providers. White list checking can be validated on a content provider-by-content provider basis and content-by-content basis. The approach uses existing, ordinary Digital Transmission Copy Protection (DTCP) certificates that are already present for link protection for premium content on the home network. The DTCP certificates supply the Device IDs for authenticated white list. Unique or common DTCP Device ID (from client certificates that are shared) are received by the set-top box server from the TV, and checked against a white list (securely delivered by the service provider). The authenticated white list will contain a device s minimum software version number and other information in order to address security concerns. We propose that a 3rd party certification process be implemented and built into the RVU Certification process and CVP-2 Certification process. (See slides on this topic) The authenticated white list approach can be used until a new version of DTCP is available that meets content providers Enhanced Content Protection (ECP) requirements. The white list may not be needed for devices implementing this new version of DTCP. Authentication Protocol: We propose using a modified version of the DLNA CVP-2 authentication (TLS with Supplemental Data). We enhanced the existing protocol to securely deliver additional signed information, including model # and the TV s current software version. Later, when link protection is established, the server can check to see if the Device ID (sent in the DTCP certificate) is the same.

5 Authentication Protocol Proposal Two Step 1) (Step 1) Device ID is obtained from TLS with Supplemental Data Auth as part of DTCP client certificate that is exchanged. Other information will be securely exchanged (Make/Model #/Serial #/MAC/UUID/SW Version, etc.) 2) Set-top box checks for Device ID in the service operator s white list, and performs other verifications: SW version, etc. 3) Set-top box and TV perform Authenticated Key Exchange (AKE) 4) (Step 2) During, DTCP AKE, Set-top box checks for Device ID in the revocation List (service Renewability Message) 5) Device ID from Authentication must be the same as in AKE DirecTV White List (e.g. new format) , SW Version , SW Version , SW Version Conditional Access , SW version , SW version , SW version Step Step 1 2 TLS with Supp Data Authentication (Cert Device ID: ) + Make/Model #/Serial #/MAC/SW Version DTCP Authenticate Key Exchange (AKE) (Cert Device ID: ) DTCP-IP (Copy Never) Ethernet or Wi-Fi Manufacturers supply service provider with list of conforming Device IDs (from DTCP certificates). Service provider must integrated them into a sequential list. This is a new protocol a version is being standardized for the DLNA CVP2 Project DTCP Revocation List (SRM Format) DirecTV Set-top Box DTCP Revocation List (SRM Format) Sony 4K TV SEL-UXTC 5

6 Authentication Approach Two Step IETF has already reviewed the cryptography associated with TLS with signed supplemental data that was used for CVP-2. And our approach will build on top of that. A general advantage of using DTCP certificates is that the service provider can confirm that the device from authentication is also the same one in link protection. DTCP allows the use of both unique and common certificates. Use of unique as opposed to common DTCP certificates may help differentiate an imposter from real devices. The reporting of the same unique Device ID by different devices, e.g. different locations at the same time, probably means that something is amiss. A combination of Common Device ID and MAC address can be used to uniquely identify a device. MAC ranges may be implemented on the authenticated white list. Common Certificates must be replaced (renewed) once a year. MovieLabs Enhanced Content Protection (ECP) specifications require a forward movement of software releases that fix security and compliance breaches. The TV must securely report its software version number (during authentication step 1) so that it can be checked against the white list data and if necessary denied service. All devices, including those in the cabin-in-the-woods, should be able to receive updated key (DTCP certificates) and software if need be.

7 Authentication Phase-in

8 Phase-in DirecTV has proposed a phase-in that is a longer term (see next slide) - starting with its current white list implementation, migrating to the simple Device ID check (described below), and then finally the modified CVP2-protocol. Sony believes that Simple Device ID white list checking or One Step could use the low-level DTCP AKE to great advantage. Devices can t lie about the Device ID because it is in the DTCP certificate Device ID can be tied to a range of security robust UHD TVs Device IDs can also be tied to software versioning (just requires proper management and the ability to securely update certificates/keys in the field

9 DIRECTV Proposed AWL Implementation Timeline Launch Launch 3Q Q Q Q Q Q 2017 For example: Inserts Unique DTCP Certs at manufacture Genie HR44 Current White List - UPnP based - Confirms TV is DIRECTV Ready & RVU Certified Authenticated WL - One step - Checks for valid DTCP Cert ID No change to TV - Sony provides DIRECTV its DTCP Cert ID ranges Authenticated WL - Two step - Checks for valid DTCP Cert ID and Supp. Data TV adds Authentication - Two step protocol Sunset of support for AWL Phase 1 Renew SW & update DTCP Certs as needed to remain on AWL For example : Inserts Common DTCP Certs at manufacture No change to TV - LG provides current & next Common Cert IDs TV adds Authentication - Two step protocol Update Common Cert ID Renew SW as needed & update DTCP Certs annually to remain on AWL For example : Inserts NO DTCP Certs at manufacture No change to TV - Samsung provides Cert IDs (either ranges for Unique, or current & next for Common) TV adds Authentication - Two step protocol Update Cert ID, if common type Renew SW as needed & update DTCP Certs annually (if common) to remain on AWL DIRECTV Proprietary 9

10 Authentication Protocol Phase-in - Proposal 1) Device ID is obtained from the existing Low Level DTCP AKE as part of the client certificate 2) Set-top box checks for Device ID in the DTCP Revocation List 3) Set-top box checks for Device ID in the DirecTV White List (possibly the same format as revocation list) - Perform in lower level or higher level DirecTV Authenticated White List (SRM Format) Conditional Access Simple Device ID Check or One Step Step 1 DTCP Authenticate Key Exchange (AKE) (Cert Device ID: ) DTCP-IP (Copy No More or Copy Never) Ethernet or Wi-Fi Manufacturers supply service provider with list of conforming Device IDs (from DTCP certificates). Service provider must integrate them into a sequential list. DTCP Revocation List (SRM Format) SEL-UXTC DirecTV DTCP Revocation List (SRM Format) Set-top Box Sony 4K TV (STB) Proprietary and Confidential 10

11 Compliance and Robustness Rules

12 Robustness Rules Summary Our goal is to get DTCP added to the studios list of approved Ultra High Definition (UHD), e.g. 4K, content outputs. Studios seem to have blessed HDCP 2.2 robustness. As you probably know, HDCP robustness rules were originally derived from DTCP robustness rules. They follow the same general format and contain much of the same language, and thus are easy to compare sideby-side with the DTCP robustness rules. HDCP 2.2 robustness is detailed the HDCP 2.0 Addendum: Our approach is to go through the HDCP 2.0 Addendum and apply everything that is pertinent to DTCP, e.g. compressed as opposed un-compressed content. An advantage to this approach is that there is no fundamental change to the PKI and cryptography 160-bit elliptic curve. Old and new DTCP certificates will work together which addresses a serious legacy issue.

13 Robustness Rules Proposal We propose an addendum to the DTLA License Agreement that specifies UHD compliance and robustness. o Compliance rules similar to Digital Only Token (DOT), but where only UHD capable DTLA devices can manage/handle UHD content o Robustness rules modified to HDCP2.2 level (discussed on previous slide) and called UHD Robustness Rules The DTCP specification is updated to add: o UHD content indicator to the Copy Management Indicator (CMI) o UHD compliance indicator to the device certificate A source device can check for the UHD compliance indicator, if not present, could decide what to do. o For example, a decision could be made by the set-top box that while the TV is does not have the compliance bit in its certificate, it appears in a white list of known secure devices, and therefore does not represent a security risk.

14 Robustness and Compliance Certification Program

15 Certification Program 3rd Party Certification: o o It should be noted that service operators and CE companies alike are not accustomed to 3rd party security scrutiny. This step might be considered burdensome for the following reasons: o + Invasive disclosure of design information o + Time consuming and requiring personnel to address each issue o + Potentially causing a delay in product launch schedules Self reporting is still very desirable and should be considered after a successful implementation where 3rd party certification was used. This is a scenario of the Trusted Implementer. Certification Proposal: o o For the DirecTV UHD service, RVU alliance handles RVU certification. They could be enlisted to perform an additional step, e.g. security analysis of the each implementation or platform. For US cable, CVP-2 compliance requires DLNA certification. Either DLNA, or, perhaps, CableLabs could be enlisted to perform security analysis as part of the overall CVP-2 program.

16 BACK-UP SLIDES

17 Hacker Scenario 1???? Pirate Assumptions: (Compliance Rule) 1) The software of a certain TV does not properly handle UHD content 2) UHD content is improperly output to another device via an interface. 3) Content is mishandled in the other device 4) UHD content is recorded to a Hard Disk Drive, and later published on the Internet SEL-UXTC Proprietary and Confidential 17

18 Hacker Scenario 2???? Pirate Assumptions: 1) Through great effort and reverse engineering, the certificate and public/private key of a certain TV is obtained 2) The proposed authentication protocol is known 3) The identity is infused into a premium ripper product allowing content to be recorded by a downloaded application to a PC or ipad. 4) A PC or ipad is able to spoof the identity of a TV 5) UHD content is recorded to the Hard Disk Drive SEL-UXTC Proprietary and Confidential 18

19 Hacker Scenario 3???? Pirate Assumptions: (Worse Possible Case) 1) The certificate public/private key of a certain TV is leaked Robustness rules were not implemented correctly 2) The proposed authentication protocol is known 3) The data exchanged between devices is known and specific device data is knowable outside the device 4) A laptop is able to spoof the identity of a TV 5) UHD content is recorded to the Hard Disk Drive, and later published on the Internet SEL-UXTC Proprietary and Confidential 19

20 Client authentication against X.509 only server Dewey CVP-2 App Opera CVP-2 Server Provide nonce1 Connect using TLS TLS extended Hello messages SupplementalData message includes nonce1 GetDTCPlocalCert() returns c_dtcpcert SignDataDTCP (nonce1 + c_dtcp Cert) returns psignature result = (nonce1+c_dtcp Cert+pSignature) SupplementalData message includes result TLS Tunnel established Verify signature c_dtcp Cert : Client DTCP Certificate nonce1 : reference number (eg counter or random)

21 Client authentication against a DTCP based server and untrusted X.509 Dewey CVP-2 App Opera CVP-2 Server verifydtcpremotecert(s_dtcp_cert) returns boolean verifydtcpsignature(sd, sig) returns boolean Connect TLS extended Hello messages using TLS SupplementalData message includes nonce1+s_dtcp Cert + X.509 Cert+ DTCP Sig SD=nonce1+s_DTCP Cert + X.509 Cert+ DTCP Sig GetlocalDTCPCert() returns c_dtcpcert SignDataDTCP (nonce1 + c_dtcp Cert) returns psignature result = (nonce1+dtcp Cert+spSignature) SupplementalData message includes result TLS Tunnel established Verify signature s_dtcp Cert : Server DTCP Certificate c_dtcp Cert : Client DTCP Certificate nonce1 : reference number (eg counter or random) Optional Method if we support server authentication

22 New DTCP Cert format Certificate Type Format Dev Gen Reserved (zero) C 2 AL AP Device ID Device ID continued (Total 40bits) Device EC-DSA Public Key (320 bits) DTLA EC-DSA signature of all preceding fields (320 bits for c and followed by d value) Change: C2 = CVP-2 bit

23 Scenario 1: Possible Elements in White List (unique cert + SW Version) + (unique next cert + SW Version) {Make/Model #/Serial #} Scenario 2: (common current cert + SW Version) + (common next Cert + SW Version) {Make/All Model #s} Scenario 3: (common current cert + SW Version) + (common next Cert + SW Version) {Make/Model#} (common current cert + SW Version) + (common next Cert + SW Version) {Make/Model#} All scenarios can exist at the same time unique with common certificates in the white list. There are two sets of common certificates ones currently being used and ones being phased-in. When most units have upgraded, updated, the old certificate can be phased out, e.g. deleted from the white list while a brand new certificate is phased-in. The previously phased-in certificate is now the new current certificate. Software versions could also know which is the latest common DTCP certificate in use. The firmware can check the DTCP certificate device ID to see if it is the correct one. However, operationally it might be nice to de-link these upgrading each out of sequence from each other.

24 DTCP Certificate Baseline Device Certificate Format

25 Inside the DTCP Certificate Certificate Type (4 bits). The only encoding which is currently defined is 0, which indicates the DTCP certificate. All other encodings are currently reserved. Certificate Format (4 bits). This field specifies the format for a specific type of certificate. Currently three formats are defined: - Format 0 = the Restricted Authentication device certificate format. - Format 1 = the Baseline Full Authentication device certificate format. - Format 2 = the Extended Full Authentication device certificate format (NOT ESTABLISHED ). - Other encodings are currently reserved. Device Generation (XSRMG, 4 bits). This field indicates the non-volatile memory capacity and therefore the maximum generation of renewability messages that this device supports. The encoding 0 indicates that the device shall have a non-volatile memory capacity for storing First- Generation SRM. The encoding 1 indicates that the device shall have a non-volatile memory capacity for storing Second-Generation SRM. Reserved Field (9 bits). These bits are reserved for future definition and are currently defined to have a value of zero. AL flag (1 bit). Additional Localization flag. The AL flag is set to value of one to indicate that the associated device is capable of performing the additional localization test, otherwise shall be set to value of zero. AP flag (1 bit). Authentication Proxy flag. A device certificate with an AP flag value of one is used by a DTCP bus bridge device, which receives a content stream using a sink function and retransmits that stream to another bus using a source function. The procedures for processing this field are specified in Appendix C. C2 flag (1bit). CVP2 flag. The C2 flag is set to a value of one to indicate that the associated device is DLNA CVP2 certified. Note the certificate when C2 is set can be used for either the DTCP authentication process or CVP Authentication process. Device ID (40 bits). Number assigned by the DTLA EC-DSA public key (320 bits) Public Key of the device EC-DSA signature (320 bits). Signature from the DTLA Certificate Authority of the components

26 System Renewability Message Structure of the First Generation System Renewability Message Format of the CRL Entry Type Block

27 Inside System Renewability Message Type - message Type field (4 bits). This field has the same encoding as is used for the certificate type field in device certificates. Generation - A message Generation field (SRMM) (4 bits). This field specifies the generation of the SRM. It is used to ensure the extensibility of the SRM mechanism. Currently, the only encodings defined are 0 and 1. The maximum size is specified in the DTCP specification available under license from DTLA. Other encodings are currently reserved. The Generation value remains unchanged even if only part of the SRM can be stored by the device (e.g. XSRMC <=SRMM). Reserved field (8 bits). These bits are reserved for future definition and are currently defined to have a value of zero. Version Number - A monotonically increasing system renewability message Version Number (SRMV) (16 bits). This value is exchanged as XSRMV during Full Authentication. This value is not reset to zero when the message generation field is changed. Certificate Revocation List (CRL) Length (16 bits). This field specifies the size (in bytes) of the CRL including the CRL Length Field (two bytes), CRL Entries (variable length), and DTLA Signature (40 bytes). CRL Entries (variable sized). The CRL used to revoke the certificates of devices whose security has been compromised. Its format is described in the following section. DTLA Signature - DTLA EC-DSA signature of these components using L-1 (320 bits).

28 System Renewability Message Example CRL

4K Network Security Proposal. UXTC - Technical Planning Group Sony Electronics 8/5/2014

4K Network Security Proposal. UXTC - Technical Planning Group Sony Electronics 8/5/2014 4K Network Security Proposal UXTC - Technical Planning Group Sony Electronics 8/5/2014 Key Points: Overview Our proposed security approach uses existing, ordinary DTCP certificates that are already present

More information

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview Digital Transmission Content Protection (DTCP) Technical and Licensing Overview 1 Overview DTCP as part of Home Network Protection Framework Link Protection Technology and Licensing Chain DTCP Technical

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

DIRECTV Set Top Box and Content Protection Description

DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Boxes There are tens of millions of active DIRECTV set-top boxes (STBs). All DIRECTV STBs receive 100% digital input signals. The

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

demonstrations of service offerings and in public comments made during advisory committee meetings.

demonstrations of service offerings and in public comments made during advisory committee meetings. DSTAC SUMMARY REPORT FINAL: 8/28/2015 Introduction The STELA Reauthorization (STELAR) Act of 2014 directed the FCC Chairman to establish a working group of technical experts that represent the viewpoints

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

DLNA Guidelines March 2014

DLNA Guidelines March 2014 DLNA Guidelines March 2014 Part 7: Authentication An Industry Guide for Building Interoperable Platforms, Devices, and Applications Fulfilling the promise of the digital home requires a cross-industry

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

Delivering Pay TV Content throughout the Connected Home Amol Bhagwat

Delivering Pay TV Content throughout the Connected Home Amol Bhagwat Delivering Pay TV Content throughout the Connected Home Amol Bhagwat Vice President & Vice-Chair, DLNA Board of Directors Principal Architect, Video Application Technologies, CableLabs DLNA VidiPath TM

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

DLNA for Streaming Subscription TV Content in the Home

DLNA for Streaming Subscription TV Content in the Home DLNA for Streaming Subscription TV Content in the Home Whitepaper Digital Living Network Alliance March 2014 Table of Contents Introduction... 2 1 The Problem -- Why VIDIPATH is needed.... 2 2 Solving

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn. CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.edu Slide 09-1 Overview Key exchange Session vs. interchange

More information

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

NIST Test Personal Identity Verification (PIV) Cards

NIST Test Personal Identity Verification (PIV) Cards NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper

More information

ATSC Standard: ATSC Security and Service Protection Standard

ATSC Standard: ATSC Security and Service Protection Standard ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

Streaming and content sharing on Philips TVs

Streaming and content sharing on Philips TVs Streaming and content sharing on Philips TVs To support a wide selection of second-screen usage scenarios, the Philips TVs support various state-ofthe-art streaming applications. Philips MyRemote app featuring

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

SBClient SSL. Ehab AbuShmais

SBClient SSL. Ehab AbuShmais SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three

More information

Cisco Trust Anchor Technologies

Cisco Trust Anchor Technologies Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

How To Make A Trustless Certificate Authority Secure

How To Make A Trustless Certificate Authority Secure Network Security: Public Key Infrastructure Guevara Noubir Northeastern University noubir@ccs.neu.edu Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

Authentication Applications

Authentication Applications Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

CLIENT DATABASE SECURITY

CLIENT DATABASE SECURITY CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date

More information

DTCP Volume 1 Supplement B Mapping DTCP to MOST M6 (Informational Version)

DTCP Volume 1 Supplement B Mapping DTCP to MOST M6 (Informational Version) DTCP Volume 1 Supplement B Mapping DTCP to MOST M6 (Informational Version) Hitachi, Ltd. Intel Corporation Panasonic Corporation Sony Corporation Toshiba Corporation Revision 1.2 March 8, 2012 20120308

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

WIRELESS LAN SECURITY FUNDAMENTALS

WIRELESS LAN SECURITY FUNDAMENTALS WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data Security Kit Outline How do you protect your critical

More information

HTTPS is Fast and Hassle-free with CloudFlare

HTTPS is Fast and Hassle-free with CloudFlare HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

How to Select a Proper Technology for HD Video Streaming in Home Networking Environments Dr. Stephen Palm, Technical Director, Broadcom Corporation

How to Select a Proper Technology for HD Video Streaming in Home Networking Environments Dr. Stephen Palm, Technical Director, Broadcom Corporation How to Select a Proper Technology for HD Video Streaming in Home Networking Environments Dr. Stephen Palm, Technical Director, Broadcom Corporation With the proliferation of digital content and the expanding

More information

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35 Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group jingan.xu@tu-ilmenau.de, mitsch@tu-ilmenau.de Abstract.

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox Extending APS Packages with Single Sign On Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox Introducing APS 2.0 A Platform for Integration APS Dynamic UI HTML5 Extensibility Certified

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Biometrics, Tokens, & Public Key Certificates

Biometrics, Tokens, & Public Key Certificates Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,

More information

How Secure is Authentication?

How Secure is Authentication? U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered

More information

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT

CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT 29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram

More information

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

CI Plus Overview. 6th July 2009. CI Plus Limited Liability Partnership (LLP) www.ci-plus.com

CI Plus Overview. 6th July 2009. CI Plus Limited Liability Partnership (LLP) www.ci-plus.com CI Plus Overview 6th July 2009 CI Plus Limited Liability Partnership (LLP) www.ci-plus.com Table of Content Page: One Page Overview of CI Plus 3 History of Common Interface 4 Requirements & Scope with

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

Configuring SSL Termination

Configuring SSL Termination CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL

More information

18-731 Midterm. Name: Andrew user id:

18-731 Midterm. Name: Andrew user id: 18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem

More information

General Content Security & Service Implementation

General Content Security & Service Implementation SCHEDULE C [VOD-EST-PAYTV] CONTENT PROTECTION REQUIREMENTS AND OBLIGATIONS This Schedule C is attached to and a part of that certain [ Agreement, dated (the Agreement ), between/among ]. All defined terms

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

2-Bay NAS Media Server Enclosure (1 x 1 TB) TN-200T1 (v1.0r)

2-Bay NAS Media Server Enclosure (1 x 1 TB) TN-200T1 (v1.0r) 2-Bay NAS Media Server Enclosure (1 x 1 TB) TRENDnet s 2-Bay NAS Media Server Enclosure (1 x 1 TB), model, is the entertainment and storage hub of a digital network. DLNA certified Smart TVs, media players,

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Building Robust Security Solutions Using Layering And Independence

Building Robust Security Solutions Using Layering And Independence Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

$750. NEW~WAVE Advanced Radio Automation. powerful software for On-air Radio, Internet Radio, & Podcasting ARRAKIS

$750. NEW~WAVE Advanced Radio Automation. powerful software for On-air Radio, Internet Radio, & Podcasting ARRAKIS ARRAKIS advancedradio R A D I O A U T O M A T I O N P R O D U C T S Advanced Radio Automation Introductory Sale... $750 NEWWV-1 automation software $1,000 msrp powerful software for On-air Radio, Internet

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?

More information

ezvsp User's Manual ( Version 2.1d ) Sollae Systems Co., Ltd.

ezvsp User's Manual ( Version 2.1d ) Sollae Systems Co., Ltd. ezvsp User's Manual ( Version 2.1d ) Sollae Systems Co., Ltd. Contents Chapter 1 Overview 1 1.1 Introduction 1 2.2 Key Features 2 Chapter 2 Installation 3 2.1 Ready to install ezvsp 3 2.2 Install ezvsp

More information

Install SQL Server 2014 Express Edition

Install SQL Server 2014 Express Edition How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

Roomie Remote Version 3

Roomie Remote Version 3 Roomie Remote creates a customized virtual remote that lets you control your home theater components and other devices with an ios device. This guide shows how to configure the Roomie Remote app to watch

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1 Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication

More information