Recoverable Encryption through Noised Secret over Large Cloud
|
|
|
- Leo Singleton
- 10 years ago
- Views:
Transcription
1 Recoverable Encryption through Noised Secret over Large Cloud Sushil Jajodia 1, W. Litwin 2 & Th. Schwarz 3 1 George Mason University, Fairfax, VA {[email protected]} 2 Université Paris Dauphine, Lamsade {[email protected]} 3 Thomas Schwarz, UCU, Montevideo {[email protected]} 1
2 What? New schemes for backup of encryption keys entrusted to an Escrow Collectively called RE NS Schemes They backup high quality encryption keys AES (256b), DH 500+b Backup itself is specifically encrypted Unlike a traditional simple key copy 2
3 What? Fast brute-force recovery remains possible In the absence of key owner Within the timing wished by the recovery requestor But only over a large cloud 1K 100K nodes 3
4 What? Unwelcome recovery is unlikely E.g. could easily take, say, 70 or even 700 days at escrow s processor alone Illegal use of a large cloud is implausible Cloud providers do best to prevent it Easily noticeable if ever starts Follow the money Leaves compromising traces in numerous logs 6
5 Why High quality key loss danger is Achilles heel of modern crypto Makes many folks refraining of any encryption Other loose many tears if unthinkable happens 7
6 Why If you create key copies Every copy increases danger of disclosure For an Escrow, her/his copy is an obvious temptation Some Escrows may not resist to In short users face the dilemma: Key loss or disclosure? That is The Question 8
7 Why RE NS schemes alleviate this dilemma Easily available large clouds make them realistic Our schemes should benefit numerous applications 9
8 How (Overview) : Key Owner Side Key owner or client chooses inhibitive timing of 1-node (bruteforce) recovery Presumably unwelcome at escrow s site alone E.g. 70 days Or 700 days for less trusted escrows Or anything between 10
9 How : Key Owner Side Consequently, the owner fixes a large integer Called backup encryption complexity or hardness Actually, this step may be programmed The backup encryption agent on client node may be in charge of 11
10 How : Key Owner Side Key owner or the agent creates the shared noised secret Some share(s) of the actual secret become noised shares «Burried» among very many look-alike but fake noise shares 12
11 How : Key Owner Side The only way to recognize whether a noise share is a noised one is to try out its «footprint» The owner/agent creates the footprint for each noised share Each footprint is unique Remember Cinderella? 13
12 How : Key Owner Side Key owner/agent sends the noised secret to Escrow Noised secret is the backup Guess your key by its print in this mess (inspired by CSIS actual ex.) 14
13 How (Overview) : Escrow Side Key requestor asks Escrow to recover data in acceptable max recovery time E.g. 10 min Escrow s server sends the time and all but one shares of the noised secret to the cloud Intruder to the cloud cannot find the key 15
14 How : Escrow s Side RE NS scheme executed at the cloud chooses the cloud size To fit the calculus time limit for sure Say 10K nodes Search for the noised share gets partitioned over the nodes Nodes work in parallel Matching the footprints 16
15 How : Escrow s Side Every lucky node reports back to Escrow the noised share found Escrow server recovers the key from all the shares Using the clasical XORing Sends the recovered key to Requestor Not forgetting the bill 17
16 What Else? Well, everything is in details Client Side Encryption Server Side Recovery Static Scheme Scalable Scheme Related Work Conclusion 18
17 More : Res. Rep. What Else? e%20encryption_10.pdf S. Jajodia, W. Litwin & Th. Schwarz. Recoverable Encryption through a Noised Secret over a Large Cloud. 5th Inl. Conf. on Data Management in Cloud, Grid and P2P Systems (Globe 2012 ) Publ. Springer Verlag, Lecture Notes in Comp. 19
18 Client Side (Backup) Encryption Client X backs up encryption key S X estimates 1-node inhibitive time D Say 70 days D measures trust to Escrow Lesser trust? Choose 700 days 20
19 Client Side Encryption D determines minimal cloud size N for future recovery in any acceptable time R Chosen by recovery requestor E.g. 10 min X expects N > D / R but also N D / R E.g. N 10K for D = 70 days N 100K for D = 700 days 21
20 Client Side Encryption X creates a classical shared secret for S S is seen as a large integer, E.g., 256b long for AES Basically, X creates a 2-share secret Share s 0 is a random integer Share s 1 is calculated as s 1 = s 0 XOR S Common knowledge: S = s 0 XOR s 1 22
21 Client Side Encryption X transforms the shared secret into a noised one X makes s 0 a noised share : Chooses a 1-way hash H E.g. SHA 256 Computes the hint h = H (s 0 ) Chooses the noise space I = 0,1,m, M-1 For some large M determined as we explain soon 23
22 Client-Side Encryption Each noise m and s 0 define a noise share s In a way we show soon as well There are M different pseudo random noise shares All but one are different from s 0 But it is not known which one is s 0 The only way to find for any s whether s = s 0 is to attempt the match H (s)?= h 24
23 Shared Secret / Noised (Shared) Secret S = XOR S 0 S 1 Hint H (s 0 ) S = S 1 XOR Noise shares S 0 Noised share S 0 n H is one-way hash SHA 256 by default Noise shares Noise space I 25
24 Client Side Encryption X estimates the 1-node throughput T # of match attempts H (s)?= h per time unit 1 Sec by default X sets M to M = Int (DT). M should be in practice 26
25 Client Side Encryption X randomly chooses m I = [0,1 M[ Calculates base noise share f = s 0 m Defines noised share s n 0 = (f, M, h). Sends the noised secret S = (s 0n, s 1 ) to Escrow as the backup 27
26 Escrow-Side Recovery (Backup Decryption) Escrow E receives legitimate request of S recovery in time R at most E chooses between static or scalable recovery schemes E sends data S = (s 0n, R) to some cloud node with request for processing accordingly Keeps s 1 out of the cloud 28
27 Recovery Processing Parameters Node load L n : # of noises among M assigned to node n for match attempts Throughput T n : # of match attempts node n can process / sec Bucket (node) capacity B n : # of match attempts node n can process / time R B n = R T n Load factor n = L n / B n 29
28 α t L Node Load 1 R B B L B L 1 T T T Overload Normal load Optimal load 30
29 Recovery Processing Parameters Notice the data storage oriented vocabulary Node n respects R iff n 1 Assuming T constant during the processing The cloud respects R if for every n we have n 1 This is our goal For both static and scalable schemes we now present 31
30 Static Scheme Intended for a homogenous Cloud All nodes provide the same throughput 32
31 Static Scheme : Init Phase Node C that got S from E becomes coordinator Calculates a (M) = M / B (C) Usually (M) >> 1 Defines N as a (M) Implicitly considers the cloud as homogenous E.g., N = 10K or N = 100K in our ex. 33
32 Static Scheme : Map Phase C asks for allocation of N-1 nodes Associates logical address n = 1, 2 N-1 with each new node & 0 with itself Sends out to every node n data (n, a 0, P) a 0 is its own physical address, e.g., IP P specifies Reduce phase 34
33 Static Scheme : Reduce Phase P requests node n to attempt matches for every noise share s = (f + m) such that n = m mod N In practice, e.g., while m < M: Node 0 loops over noise m = 0, N, 2N So over the noise shares f, f + N, f + 2N Node 1 loops over noise m = 1, N+1, 2N+1.. Node N 1 loops over m = (your guess here) 35
34 Static Scheme : Node Load α t, L.. f + 2N f + N f.. f + 2N + 1 f + N + 1 f f + 2N + 2 f + N + 2 f f + 3N - 1 f + 2N - 1 f + N R, B 1 T N
35 Static Scheme Node n that gets the successful match sends s to C Otherwise node n enters Termination C asks every node to terminate Details depend on actual cloud C forwards s as s 0 to E 37
36 Static Scheme E discloses the secret S and sends S to Requestor Bill included (we guess) E.g., up to 400$ on CloudLayer for D = 70 days R = 10 min Both implied N = 10K with private option 38
37 Static Scheme Observe that N D / R and N D / R If the initial estimate of T by S owner holds Observe also that for every node n, we have (n) 1 Under our assumptions maximal recovery time is thus indeed R Average recovery time is R / 2 Since every noise share is equally likely to be the lucky one 39
38 Static Scheme See papers for Details, Numerical examples Proof of correctness The scheme really partitions I Whatever is N and s 0, one and only one node finds s 0 40
39 Static Scheme Safety No disclosure method can in practice be faster than the scheme Dictionary attack, inverted file of hints Other properties 41
40 Scalable Scheme Heterogeneous cloud Node throughputs may differ 42
41 Scalable Scheme Intended for heterogenous clouds Different node throughputs Basically only locally known E.g. Private or hybrid cloud Public cloud without so-called private node option 43
42 Scalable Scheme Init phase similar up to (M) calculus Basically (M) >> 1 Also we note it now 0 If > 1 we say that node overflows Node 0 sets then its level j to j = 0 and splits Requests node 2 j = 1 Sets j to j = 1 Sends to node 1, (S, j, a 0 ) 44
43 Scalable Scheme As result There are N = 2 nodes Both have j = 1 Node 0 and node 1 should each process M / 2 match attempts We show precisely how on next slides Iff both 0 and 1 are no more than 1 Usually it should not be the case The splitting should continue as follows 45
44 Scalable Scheme Recursive rule Each node n splits until n 1 Each split increases node level j n to j n + 1 Each split creates new node n = n + 2 j n Each node n gets j n = j n initially Node 0 splits thus perhaps into nodes 1,2,4 Until 0 1 Node 1 starts with j= 1 and splits into nodes 3,5,9 Until
45 Scalable Scheme Node 2 starts with j = 2 and splits into 6,10,18 Until 2 1 Your general rule here Node with smaller T splits more times and vice versa 47
46 Scalable Scheme : Splitting Node 0 split 5 times. Other nodes did not split. B α = 0.8 α = 0.7 α = 0.5 j 5 T T T
47 Scalable Scheme If cloud is homogenous, the address space is contiguous Otherwise, it is not No problem Unlike for a extensible or linear hash data structure 49
48 Scalable Scheme : Reduce phase Every node n attempts matches for every noise k [0, M-1] such that n = k mod 2 j n. If node 0 splits three times, in Reduce phase it attempts to match noised shares (f + k) with k = 0, 8, 16 If node 1 splits four times, it attempts to match noised shares (f + k) with k = 1, 17, 33 Etc. 50
49 Scalable Scheme : Reduce Phase B. f + 16 f + 8 f α = 0.5 T j 3 L f + 33 f + 17 f
50 Scalable Scheme N D / R If S owner initial estimate holds For homogeneous cloud it is 30% greater on the average and twice as big at worst / static scheme Cloud cost may still be cheaper No need for private option Versatility may still make it preferable besides 52
51 Scalable Scheme Max recovery time is up to R Depends on homogeneity of the cloud Average recovery time is up to R /2 See again the papers for Examples Correctness Safety Detailed perf. analysis remains future work 53
52 Related Work RE scheme for outsourced LH* files CSCP scheme for outsourced LH* records sharing Crypto puzzles One way hash with trapdoor 30-year old excitement around Clipper chip Botnets 54
53 Conclusion Key safety is Achilles heel of cryptography Key loss or key disclosure? That is The Question RE NS schemes alleviate the dilemma Future work Deeper formal analysis Proof of concept implementation Variants 55
54 Thanks for Your Attention Witold LITWIN & al 56
Scalable Distributed Virtual Data Structures
24 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-3, 24 Scalable Distributed Virtual Data Structures Sushil Jajodia, Witold Litwin 2, Thomas Schwarz, SJ 3 George Mason University,
Numerical SQL Value Expressions Over Encrypted Cloud Databases
Numerical SQL Value Expressions Over Encrypted Cloud Databases Sushil Jajodia George Mason University Fairfax, Virginia, USA 1.703. 9932952 [email protected] Witold Litwin Université Paris Dauphine Paris,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
The Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Secret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Overview of Scalable Distributed Database System SD-SQL Server
Overview of Scalable Distributed Database System Server Witold Litwin 1, Soror Sahri 2, Thomas Schwarz 3 CERIA, Paris-Dauphine University 75016 Paris, France Abstract. We present a scalable distributed
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle
Network Security Chapter 6 Random Number Generation Prof. Dr.-Ing. Georg Carle Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
The science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
DISTRIBUTED AND PARALLELL DATABASE
DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Chapter 13. Chapter Outline. Disk Storage, Basic File Structures, and Hashing
Chapter 13 Disk Storage, Basic File Structures, and Hashing Copyright 2007 Ramez Elmasri and Shamkant B. Navathe Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS) http://www.elcomsoft.
Presentation on Black Hat Europe 2003 Conference Security Analysis of Microsoft Encrypting File System (EFS) Microsoft Encrypting File System Encrypting File File System System (EFS) (EFS) is is a a new
Whitepaper: performance of SqlBulkCopy
We SOLVE COMPLEX PROBLEMS of DATA MODELING and DEVELOP TOOLS and solutions to let business perform best through data analysis Whitepaper: performance of SqlBulkCopy This whitepaper provides an analysis
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Data Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
DataTrust Backup Software. Whitepaper Data Security. Version 6.8
Version 6.8 Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
PIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
Chapter 13. Disk Storage, Basic File Structures, and Hashing
Chapter 13 Disk Storage, Basic File Structures, and Hashing Chapter Outline Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and Extendible Hashing
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Network Security. Chapter 6 Random Number Generation
Network Security Chapter 6 Random Number Generation 1 Tasks of Key Management (1)! Generation:! It is crucial to security, that keys are generated with a truly random or at least a pseudo-random generation
Wireless Pre-Shared Key Cracking (WPA, WPA2)
Wireless Pre-Shared Key Cracking (WPA, WPA2) TABLE OF CONTENTS Introduction... 2 Mechanics Of PSKs And How They Work Demystified... 2 How PSKs Can Be Cracked!... 5 WPA2 PSK Cracking Demonstration.... 6
Introduction to Computer Security
Introduction to Computer Security (ECE 458) Vijay Ganesh Spring 2014 Online Resources, Books, Notes,... Books Introduction to Computer Security by Matt Bishop Computer Security: Art and Science by Matt
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
