Random Numbers in Data Security Systems
|
|
|
- Alexander Harrington
- 10 years ago
- Views:
Transcription
1 Random Numbers in Data Security Systems Intel Random Number Generator Scott Durrant Intel Platform Security Division
2 Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Copyright Intel Corporation *Other brands and names are the property of their respective owners. ii
3 Contents INTRODUCTION...1 Intel Platform Security Vision...1 Authentication...2 Confidentiality...2 Integrity...3 RANDOM NUMBERS...3 SOFTWARE (PSEUDO) RANDOM NUMBER GENERATORS...5 HARDWARE RANDOM NUMBER GENERATORS...6 Testing for Randomness...6 CASE STUDY: SSL SECURITY BREACH...6 CONCLUSION...8 REFERENCES...8 iii
4
5 Introduction As data traffic over public and private data networks increases, it becomes increasingly important to protect the privacy of information stored on and exchanged between personal computers. Intel recognizes this need and is adding security building blocks to core components of the computer to increase the security of the system platform. One of these building blocks is a hardware random number generator (RNG). This paper is an introduction to fundamental security concepts of data encryption, user authentication, and digital signature usage, and points out the importance of the hardware-based Intel Random Number Generator to these concepts. It also describes why the hardware-based Intel RNG is superior to software-based RNG s currently used in security programs. The computer has become a ubiquitous information appliance touching almost every aspect of life. Whether used to track personal finances, send to friends, design the next generation aircraft, purchase a book over the Internet or maintain banking records, computing systems play a significant and growing role in the modern world. One of the most significant advances in computing this decade has been the development and advancement of networked computing. Local Area Networks, Wide Area Networks, the global Internet, and even home networking have created an enormous network of computing resources that provides a wealth of information to anyone with a computer and modem or network card. This pervasive and ever expanding connectivity is, in most respects, a tremendous asset. However, it also brings an increased need for strong computer and communications security. Intel Platform Security Vision Intel Corporation s vision for computing is "a billion trusted, connected computers, a million trusted, connected servers." Intel believes that security in computing is a fundamental element of realizing this vision. Enhanced platform security is needed to manage the increasingly open connectivity the future holds and to ease the security concerns of users, particularly new users that have been reluctant to get connected in the past. Better PC security is fundamental to future growth in the use of PCs for electronic business and electronic commerce applications. Intel s security vision is that every Intel platform has the security needed for communications and electronic transactions in the connected world. Platform silicon is a key element to achieving this level of security. By implementing key security features at the silicon level in every PC platform, all systems will develop a core foundation of security capabilities. Enhanced security will become ubiquitous and synonymous with the Intel architecture platform. A security solution implemented in hardware is often more robust than a software solution, since hardware has the unique ability to hide secrets. Better security solutions implemented across all PC systems will pave the way towards increased connectivity, access to new products and services, and new business models. The Intel Random Number Generator is a fundamental building block for strengthening and securing the confidentiality of electronic communications. Random number generation is a key component of the encryption processes that protect data. Most random number generators available today are software-based RNGs, which are not capable of generating truly random data. Because software RNGs generate random data by means of a fixed algorithm, their output can be predictable. This predictability weakens software-only encryption schemes relative to hardware-based systems. The silicon-based Intel Random Number Generator generates true 1 random numbers (numbers which are unpredictable) which can increase the strength of an encryption system. The Intel RNG has gone through FIPS Some might argue that it is not possible to generate a true random number. This paper assumes Schneier s definition of true (or real) random number generators they generate sequences that look random, are unpredictable, and cannot be reliably reproduced [10]. More detailed discussions of true versus pseudo- random numbers are presented in [1], [2], and [4]. 1
6 1 2 and other statistical test validations, making it a preferred solution wherever random numbers are required. The Intel RNG is a key component for use in any strong security solution. Businesses and consumers rely on networks for communication, using computers as their protected entry point. In a world that increasingly depends on digital information, computer users can now justifiably expect more security. The Intel RNG provides a strong foundation for PC data security. ISVs (Independent Software Vendors) demand a ubiquitous platform upon which to deploy their enhanced solutions. Intel s security building blocks enable OEMs to deliver new security technology on broadly deployed IA (Intel Architecture) platforms and to enhance their product lines with a new category of security-enabled systems. Random Numbers in Cryptography Cryptography is defined as the art and science of keeping messages secure. [10] There are three major elements to keeping messages secure: 1. Authentication: Ensuring that the person at the other end of the connection is who you think they are (to eliminate fraud). 2. Confidentiality: Ensuring that no unauthorized person listening to the transaction is able to extract meaningful information. 3. Integrity: Ensuring that there are no undetected changes to the transaction as it travels from the sender to the intended recipient. Random numbers are fundamental building blocks of cryptographic systems and as such, play a key role in each of these elements. Random numbers are used to inject unpredictable or non-deterministic data into cryptographic algorithms and protocols to make the resulting data streams unrepeatable and virtually unguessable. Authentication Random numbers are used to authenticate systems with a challenge, or a piece of unrepeatable and virtually unguessable data to process and return. For example, a simple challenge-response authentication protocol is carried out as follows: 1. A client requests access to password protected information stored on a server; 2. The server responds with a random challenge a random number, possibly combined with other information; 3. The client encrypts the random challenge using its password as a key. The client then returns the encrypted challenge to the server; 4. The server encrypts the same random challenge with the client s password (which the server gets from its own password database); 5. The server compares the two results. If the results match, the server has authenticated the client without the client ever sending its password over the network. Confidentiality Confidentiality is provided through data encryption, which is the process of combining plain text input (plaintext) with a cryptographic key in a well-defined manner, and returning ciphertext (encrypted data). In an ideal cryptosystem, it is impossible for anyone to decrypt the ciphertext without the decryption key. By ensuring that only 2 FIPS is the United States government s Federal Information Processing Standard. A publication of the National Institute of Standards and Technology, the FIPS specification describes government requirements for cryptographic modules for sensitive, but unclassified use. For general information about FIPS 140, see the FAQ from Corsec Security, Inc. at 2
7 the intended recipient of the data has the required decryption key, one can protect data from observation by an unauthorized party. Random numbers play a critical role in the generation of the cryptographic keys used for encrypting and/or decrypting data. There are two major types of cryptographic keys: symmetric and asymmetric. Symmetric keys can be used for both encrypting and decrypting data. Asymmetric keys are produced in pairs, each pair consisting of a public key, generally used to encrypt data, and a private key, generally used to decrypt data. The strength of a cryptosystem lies in the strength of the key, which is a function of the key length (number of bits) and the randomness of the number used to generate the key. Although it is true that a weak algorithm can leak information that will make it possible to decipher a message, ultimately it is the strength of the secret key that makes an encrypted message impervious to discovery. It is for this reason that sufficiently long, truly random numbers should be used in key generation. Sufficiently long in this context means that the number is large enough that it cannot be guessed in the useful lifetime of the encrypted data it protects. For example, some common key lengths in use today are 40 (RC4), 56 (DES), 128 (RC4), and 168 (3-DES) bits. Integrity The integrity of a message sent over a network can be guaranteed through digital signatures and cryptographic hashes. A digital signature is a fixed-length binary string unique to a given message, signed with a private key. The unique string (known as a message digest, or cryptographic hash) is similar to a fingerprint although the number of possible messages is enormous, the likelihood of any two hashes being the same is miniscule. Because the hash is signed with the originator s private key, anyone with the originator s public key can decrypt the message, and can be certain that the owner of the private key originated the message. By generating another hash of the message using the same hashing algorithm as the originator, and comparing the new hash with the signed hash, the recipient can verify that the message did not change after leaving the originator. Random numbers are used in some digital signature generation algorithms to make it difficult for a malicious party to forge the signature. The degree of randomness of the random number has a direct impact on the strength of the signature. Random Numbers Random numbers are fundamental to all aspects of data security. The strength of a security mechanism is directly proportional to the randomness of the numbers it uses. As an example, consider the process of encrypting data. Assume for a moment that we are going to encrypt some data using the following simple encryption algorithm: c k + p = where c = the encrypted ciphertext k = the encryption key (derived from a random number) p = the original message (plaintext) If k = 2 and p = DOGS HAVE FOUR LEGS, then c = FQIU JCXG HQWT NGIU 3 (each letter in the plaintext is incremented by 2 to generate the ciphertext, so A C, B D, etc.). This message looks pretty mixed up, but given the algorithm (most popular algorithms are widely published), it could be decoded in a few seconds even without the use of a computer. Further, if the value of k were fixed (i.e., if the same key were used each time) it would take very little effort to decode subsequent messages, which means that the encryption is compromised. Now consider a slightly stronger algorithm: c = k p 3 For simplicity in this and subsequent examples, the word spacing from the original message is preserved. In a real cryptosystem the spaces would also be encrypted. 3
8 where the symbol represents the bitwise Boolean exclusive OR (XOR) operation. Now it is more difficult to decrypt the message. In fact, most people probably couldn t do it in their head, but with a pencil and paper it wouldn t be difficult for someone who knew the key to decrypt the message. (In this case, they would also need to understand binary operations and ASCII encoding.) With a computer to do the decrypting it s even easier a fairly simple modification to the decryption program (to use the new algorithm), and the computer will output the correct answer every time. Now assume that there is a different key for each message. For the sake of simplicity, we ll use the original algorithm, c = k + p Having already intercepted one message and learned that k (the secret key) = 2, it was easy to decode this message. Now let s look at another message: WXVSRK OICW WIGYVI HEXE Most people 4 would decipher this message using a brute force attack. That is, they would guess a value for k and see if the resulting message made sense. Then they would guess another value, and so on. Here is a brute force attack using sequential values of k, starting at 1: k = 1: VWURQJ NHBV VHFXUH GDWD k = 2: UVTQPI MGAU UGEWTG FCVC k = 3: TUSPOH LFZT TFDVSF EBUB k = 4: STRONG KEYS SECURE DATA Here s another message, encrypted with a new key: TKBKX XKBKGR EUAX VXOBGZK QKE 5 Did you use a brute force attack again? Just in case, let s try one more example: KZGXBWOZIXPG ACZM QA NCV 6 By now you are probably getting pretty good at this. You have probably discovered that there is a pattern to the keys. Each new key is equal to the previous key plus two. If you had to decrypt a lot of these messages in your head, it might take you a minute or two each time. A computer could do it almost instantaneously. The encryption is weak because there is a pattern to the keys they are not random. Now try decoding the next three messages. 7 HVS GIB WG O MSZZCK GHOF L UHDG D JUHDW ERRN BHVWHUGDB OXKALJ KRJYBOP XOB FJMLOQXKQ 4 A trained cryptographer might use linguistic analysis as a more efficient approach than brute force, but that is beyond the scope of this paper. 5 NEVER REVEAL YOUR PRIVATE KEY (key = 6) 6 CRYPTOGRAPHY SURE IS FUN (key = 8) 7 THE SUN IS A YELLOW STAR (key = 14) I READ A GREAT BOOK YESTERDAY (key = 3) RANDOM NUMBERS ARE IMPORTANT (key = 23) 4
9 That was a lot harder, wasn t it? The reason it was harder was that the keys were chosen at random. 8 Unless you detected some pattern, you probably had to use a brute force attack on all three messages. As this example illustrates, using random keys makes decryption much more difficult (unless you already know the key). In this extremely simplistic example, the range of valid keys was In a realistic modern cryptosystem there are typically 2 40 (= ) possible 40-bit keys or (= ) 128-bit keys. It would take a lot of computing power to guess the correct key. If, on the other hand, the keys are not generated at random and one can find a pattern or narrow the range of possible values, finding the real key becomes much easier. In fact, if just one bit of a key can be predicted, the work required to determine the rest of the key is cut in half. To illustrate, assume for a moment that a hypothetical person named Alice is going to encrypt a message using a 4- digit 10 key (which has 10,000 possible values). Imagine that an unknown eavesdropper, Eve, was able to watch Alice select a key. Eve noticed that Alice looked at a digital clock to select the number. Eve could immediately conclude that Alice s key was in the range 0 59, greatly simplifying her task of decrypting Alice s message. In fact, if Eve knew what time it was when Alice selected her key, she might be able to narrow the possible range of keys to just 3 or 4 (to account for possible discrepancies between her clock and Alice s). Suddenly Alice s 4-digit key has been effectively reduced to 1 digit, and Eve could crack the encrypted message in just 3 or 4 attempts. Alice could strengthen her encryption system by using a hardware random number generator. By definition, a random number is unpredictable. It is independent of all other numbers, and therefore is not part of any pattern. As a result, a truly random number can be discovered only through a process of trial and error (a.k.a. brute force ). Utilizing a true random number to generate an encryption/decryption key will yield the strongest possible encryption for a given cryptosystem. If a true random number generator were used to generate the key in the example above, it would take Eve, on average, 5,000 attempts (half of all possible values) to guess Alice s decryption key. Software (Pseudo) Random Number Generators Most modern computer programs use software generated pseudo random numbers rather than true random numbers. Pseudo random number generators (PRNGs) require a seed which is used as an operand in a mathematical computation to create the pseudo random number. Typical seeds are bits of data collected from various aspects of the computer s internals, including the clock, running processes, status registers, key press timing, and mouse movements. Because PRNGs employ a mathematical algorithm for number generation, all PRNGs possess the following properties: A seed value is required to initialize the equation The generated sequence of numbers will eventually repeat Application developers who require non-deterministic output from a PRNG must take pains to provide an unguessable seed value and an algorithm with a period that is sufficiently long. The seed sources mentioned above can be used to incorporate randomness into the seed. However, system interrupt and event handling within different systems have been known to reduce the effective randomness of these sources. In spite of the drawbacks of PRNGs, they are widely used in computer applications. PRNGs are readily available for all types of computer systems today. Because they are implemented in software, PRNGs are easy to add to a 8 Actually, they were the result of arbitrary selection within the range The human mind makes a very poor random number generator, but these keys will do for our simple illustration. 9 These examples use only the 26 upper-case letters of the English alphabet. In the simple algorithm used for this example, if k = 26, c = p (A + 26 = A, B + 26 = B, etc.). Therefore, the useful range of keys is To simplify the example I am using base 10 keys, rather than binary keys. We humans tend to be a little more comfortable thinking in base 10. 5
10 system there is no need to open the computer and add or reconfigure hardware. As a result, most computer applications today use PRNGs to generate the random data they require. Many of the better PRNGs produce acceptable output for non-cryptographic applications (such as modeling, gaming, etc.). However, as the power of computing systems increases, cryptographic applications demand a higher degree of randomness than can be provided by a PRNG. Because they are not truly random, pseudo random numbers cannot give the level of cryptographic protection that true random numbers can provide. Hardware Random Number Generators A hardware random number generator is an electronic device that produces genuine random numbers (as opposed to pseudo random numbers). Generally, these devices operate by extracting data from a thermal noise source such as a resistor or a semiconductor diode, or from air turbulence within a sealed, dedicated disk drive. [4] Hardware random number generators are non-deterministic by nature no algorithm can be used to predetermine subsequent bits. Thus, hardware RNGs are not susceptible to intrusion or exposure by algorithm disassembly or disclosure. The property of non-determinism has been shown to be especially important in specific RNG applications such as certain scientific and financial modeling techniques, government-sponsored lotteries, and computer security technology such as cryptography and digital signatures. Hardware random number generators do not require seeds because hardware random numbers are not computed values. They are not derived through a repeatable algorithm. Rather, hardware-generated random numbers are digitized snapshots of naturally occurring thermal noise. Testing for Randomness There are a variety of tests and benchmarks that can be applied to an RNG to rate its effectiveness. Among these are Dr. George Marsaglia s Diehard tests [2] and the U.S. government s Federal Information Processing Standard FIPS specification [5]. The Diehard test suite consists of a battery of statistical tests focused on identifying patterns and non-uniform distribution of numbers within the output bit stream. This test suite, which was originally developed for evaluating the randomness of pseudo random number generators, also attempts to identify short periods of repetition in PRNG output. The FIPS test suite provides measures of four characteristics of RNG output: 6 duty cycle (the number of ones divided by total bits generated) relative occurrence of 4-bit strings runs of consecutive like bits absence of runs of 34 or more like bits Case Study: SSL Security Breach An incident widely publicized a few years ago illustrates the vulnerability of pseudo random numbers in cryptographic applications. In this incident, the data encryption system of an early version of a Web browser was compromised. When establishing a secure session, the browser collected data from the system clock and process ID table. It used that data as a seed for a pseudo random number generator, which manipulated the seed and output a pseudo random number. This number was used to create a symmetric key for encrypting and decrypting data through the remainder of the session. Two graduate students at the University of California at Berkeley discovered that if they had an account on the system on which the browser was running, they could discover the data used to seed the PRNG and guess the key
11 within one minute. Even without an account on the browser s host system, they were able to reduce the range of possible seed (and, therefore, key) values considerably, making the code relatively easy to break. The students posted their discovery to a Usenet newsgroup, where it was widely read. When the browser vendor investigated the problem they discovered that the seed data for their PRNG only contained about 30 bits of random data, significantly fewer than necessary to generate strong 40- and 128-bit keys. The vendor quickly addressed the problem by strengthening their PRNG, but not before they received sharp criticism in the press. The perceived magnitude of the security compromise is clear, as quoted from the following article: A serious security flaw has been discovered in... software used for computer transactions over the Internet's World Wide Web, threatening to cast a chill over the emerging market for electronic commerce. -New York Times, September 19, 1995 The weakness in the browser implementation that made it possible to discover keys and decipher messages was a weak system for generating secret keys. Had the browser vendor utilized a hardware random number generator with a true random data source, the encryption mechanism would have been much stronger, and probably would not have been compromised. 7
12 Conclusion A high quality, hardware-based random number generator is absolutely fundamental to providing a high level of information security. Because random numbers are the foundation for secure cryptographic solutions, digital signatures, and protected communication protocols, the best random number generator (RNG) should produce statistically random and indeterministic numbers. Only a hardware RNG can meet both of these requirements. The hardware-based Intel Random Number Generator, integrated into Intel Architecture platforms, strengthens applications like Web browsing, e-business, and remote access, which currently use software-based random number generators. References [1] Davies, Robert. True Random Numbers. (9 Oct. 1998). [2] Diehard. (16 Oct. 1998) [3] Eastlake, D., S. Crocker, and J. Schiller. Randomness Recommendations for Security. Internet Engineering Task Force RFC 1750, [4] Ellison, Carl. Cryptographic Random Numbers. Draft P1363 Appendix E. (9 Oct. 1998). [5] FIPS 140-1, Security Requirements for Cryptographic Modules. Federal Information Processing Standards Publication U.S. Department of Commerce/NIST, National Technical Information Service. Springfield, Virginia, (16 Oct. 1998) [6] Helsinki University of Technology. Introduction to Cryptography, (16 Oct. 1998). [7] Knuth, Donald E. The Art of Computer Programming. Vol. 2, Seminumerical Algorithms. 2nd ed. Reading, MA: Addison-Wesley, 1981 [8] Markoff, John. Security Flaw Is Discovered In Software Used in Shopping. The New York Times, 19 September 1995, sec. A, p. 1. [9] Peterson, Ivars. The Jungles of Randomness. New York: John Wiley & Sons, [10] Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
One Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Archived NIST Technical Series Publication
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle
Network Security Chapter 6 Random Number Generation Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: [email protected] Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT
WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT Namzak Labs White Paper, 2002-02 Version 1 September 30, 2002 Overview As deployment of computer applications over the Internet becomes more prevalent, companies
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
128-Bit Versus 256-Bit AES Encryption
Technology Paper 128-Bit Versus 256-Bit AES Encryption Authentication Module Encryption Engine Background There is some confusion around the market for full disk encryption (FDE) products. Seagate Technology
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
