Post quantum Crypto Standardisation in IETF/IRTF. Kenny Paterson Information Security
|
|
- Grace Terry
- 6 years ago
- Views:
Transcription
1 Post quantum Crypto Standardisation in IETF/IRTF Kenny Paterson Information Security
2 Overview IETF/IRTF and the role of CFRG CFRG work on post quantum crypto CFRG s current future plans 2
3 Caveat I do not speak for the IRTF, the IETF or any other organisation. What follows are my personal opinions and not an official policy statement by any organisation. 3
4 Objective of IETF/IRTF Make this work! 4
5 IETF and IRTF IETF: focus on engineering, standardisation of better protocols and new features. IRTF: research oriented, longer term perspective. IRTF is organised into Research Groups (RGs). CFRG is the Crypto Forum Research Group. 5
6 CFRG Charter C F R G The Crypto Forum Research Group (CFRG) is a general forum for discussing and reviewing uses of cryptographic mechanisms, both for network security in general and for the IETF in particular. The CFRG serves as a bridge between theory and practice, bringing new cryptographic techniques to the Internet community and promoting an understanding of the use and applicability of these mechanisms via Informational RFCs. Our goal is to provide a forum for discussing and analyzing general cryptographic aspects of security protocols, and to offer guidance on the use of emerging mechanisms and new uses of existing mechanisms. 6
7 CFRG Processes C F R G ID (Internet Draft): a raw text document describing an algorithm, protocol or idea. CFRG process RFC (Request for Comments): de facto an Internet standard *. Main CFRG objective: turn useful looking IDs into complete, clear, well specified RFCs by tapping into expertise of the Internet community. Current documents: 7
8 CFRG Chairs and Their Roles C F R G Current chairs of CFRG: Alexey Melnikov: IETF lifer, huge experience in IETF processes, writing RFCs, running IETF WGs. Kenny Paterson: cryptographer, gradually learning the process ropes. 8
9 CFRG and PQC C F R G CFRG started work on PQC before the NIST PQC standardisation process was announced. Initial focus on stateful, hash based signatures. Rationale: mature, well understood cryptography, ready for standardisation. Two Internet Drafts are now in the last stages of becoming RFCs: XMSS: Extended Hash Based Signatures (draft irtf cfrg xmss hashbased signatures 10). Hash Based Signatures (draft mcgrew hash sigs 07). 9
10 Beyond Hash based Signatures C F R G CFRG currently has no plans to develop RFCs for further PQC algorithms. This could change if the CFRG community has the appetite for it. My personal view: the NIST process should continue to take precedence. It is the focus of the scientific community. It has the resources and experience to run the large scale, multi year process that is envisaged. 10
11 Beyond Hash based Signatures The IETF needs to be ready to start using new algorithms and protocols once they are finalised by NIST. This requires keeping a watching eye on the NIST process, and understanding how new crypto mechanisms can be smoothly integrated into IETF protocols. Easy in theory, some road bumps in practice: 11 Larger key sizes may break packet limits in some situations. PQ key exchange flows may badly affect protocol latency/round trips. Securely combining different types of key exchange (pre q and post q), hedging against uncertainty over timescale for arrival of large scale QC and against uncertainty over pre Q security of post Q algorithms. CFRG can act as a conduit between the NIST process and IETF.
12 What about QKD? C F R G For the avoidance of doubt, and as far as I can tell, there is no appetite for doing anything with QKD in IETF/IRTF. The EU Quantum Technologies Flagship has made a virtue out of current QKD systems inherent range limitation: The advantage of trusted node schemes is that they provide access for lawful intercept ( QT Flagship Intermediate.pdf, page 6) The IETF takes a very different view on the desirability of such an approach. See RFC 2804 IETF Policy on Wiretapping and RFC7258 Pervasive Monitoring is an Attack. 12
13 Thanks/Danke/Merci C F R G 13
14 Thanks/Danke/Merci F C F R 14
15 Thanks/Danke/Merci T F C F 15
16 Thanks/Danke/Merci R/E T F C 16
17 Thanks/Danke/Merci I R/E T F 17
Hash-based Signatures
Hash-based Signatures IETF/IRTF CFRG Draft on XMSS Fraunhofer Workshop Series 01 Post-Quantum Cryptography in Practice Speaker: Dr. Bernhard Jungk 1 extended Merkle Signature Scheme 2 extended Merkle Signature
More informationPOST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK DR. DANIEL SLAMANIG
POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK 2018 02.02.2018 DR. DANIEL SLAMANIG WHAT IS POST-QUANTUM CRYPTOGRAPHY? Also called quantum safe/resistant cryptography NOT quantum cryptography (= quantum
More informationPrivacy in the Internet Engineering Task Force. Alissa Cooper
Privacy in the Internet Engineering Task Force Alissa Cooper What the IETF does HTTP / DNS TCP / UDP IP 2" What the IETF does HTTP / DNS TCP / UDP IP 3" What the IETF does HTTP / DNS TCP / UDP IP 4" Historic
More informationPQ-Crypto Standardization Preparing today for the future of cryptography
PQ-Crypto Standardization Preparing today for the future of cryptography Workshop Quantum-Safe Cryptography for Industry (QsCI) Aline Gouget Principal researcher, Advanced Cryptography team Manager Embedded
More informationTowards Post-Quantum Cryptography Standardization. Lily Chen and Dustin Moody National Institute of Standards and Technology USA
Towards Post-Quantum Cryptography Standardization Lily Chen and Dustin Moody National Institute of Standards and Technology USA First mile - Towards PQC standardization After about four years of preparation,
More informationSelection of Cryptographic Algorithms, Post-Quantum Cryptography: ANSSI Views
Selection of Cryptographic Algorithms, Post-Quantum Cryptography: ANSSI Views Henri Gilbert Head of Crypto Laboratory ANSSI, France henri.gilbert@ssi.gouv.fr Issue > medium/long term security of cryptographic
More informationNIST Post- Quantum Cryptography Standardiza9on
NIST Post- Quantum Cryptography Standardiza9on Lily Chen Cryptographic Technology Group Computer Security Division, Informa9on Technology Lab Na9onal Ins9tute of Standards and Technology (NIST) NIST Crypto
More informationIRTFOPEN 100. Allison Mankin, IRTF Chair
IRTFOPEN Meeting @IETF 100 Allison Mankin, IRTF Chair Note Well Also Note The IRTF follows the anti-harassment policies of the IETF. This is a summary of those rules as they relate to the IRTF: IRTF meetings,
More informationEncryption Everywhere
Encryption Everywhere Adapting to a New Reality that favors Security and Privacy Kathleen Moriarty EMC Office of CTO IETF Security Area Director (Speaking for myself, not the IETF) 1 Agenda Protocol and
More informationPublic Key Infrastructures
Public Key Infrastructures The Web PKI Cryptography and Computer Algebra Prof. Johannes Buchmann Dr. Johannes Braun TU Darmstadt Cryptography and Computer Algebra Lecture: Public Key Infrastructures 1
More informationUpdate on NIST Post-Quantum Cryptography Standardization. Lily Chen National Institute of Standards and Technology USA
Update on NIST Post-Quantum Cryptography Standardization Lily Chen National Institute of Standards and Technology USA Where we are? Dec 2016 NIST Announcement of Call for Proposals on post-quantum cryptography
More informationStandardisation efforst in lightweight cryptography
Standardisation efforts in lighweight cryptography February 2, 2014 Outline Motivation for standardisation. Keeloq. Standardisation processes and structures at ISO. What is in the ISO standards currently?
More informationUses of Cryptography
Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can
More informationThe H2020 PQCRYPTO project
The H2020 PQCRYPTO project Andreas Hülsing 05 October 2015 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Post-Quantum Cryptography for Long-term Security Project funded by EU in Horizon 2020. Starting
More informationWhat s Happening at the IETF & IRTF? Human Rights Protocol Considerations and how to get involved
18 September 2017 What s Happening at the IETF & IRTF? Human Rights Protocol Considerations and how to get involved Salam Yamout Middle East Bureau Director meynell@isoc.org Presentation title Client name
More informationInitial recommendations of long-term secure post-quantum systems
Initial recommendations of long-term secure post-quantum systems Tanja Lange 07 September 2015 Dagstuhl Workshop on Quantum Cryptanalysis Post-Quantum Cryptography for Long-term Security Project funded
More informationPost-Quantum Cryptography A Collective Challenge
Post-Quantum Cryptography A Collective Challenge Christophe Petit University of Oxford Mathematical Institute Christophe Petit -Oxford Crypto Day 1 Cryptography is very useful Cryptography is the science
More informationAbstract. Microsoft Research
Abstract The development and adoption of a cryptographic standard is a delicate endeavor with competing and conflicting actors, which becomes only harder with integration into security protocols some yet
More informationIRTF Open Meeting. Lars Eggert IRTF Chair IETF-94, Yokohama, Japan
IRTF Open Meeting Lars Eggert IRTF Chair IETF-94, Yokohama, Japan IRTF IPR Policy The IRTF follows the IETF Intellectual Property Rights (IPR) disclosure rules. This is a summary of these rules as they
More informationA roadmap to migrating the internet to quantum-safe cryptography
A roadmap to migrating the internet to quantum-safe cryptography William Whyte, Security Innovation 2013-09-26 Conditions for successful deployment Post-quantum crypto must be: Agreed Standardized in core
More informationNational Strategies. Key Domain Primary Direction
An Overview of PQC Research Activities and Standardization Concerns in China 4 th ETSI Quantum-Safe Cryptography Workshop Toronto, Canada. Sept. 19-21 2016 Hong Xiang, Tao Xiang Chongqing University Zhen-feng
More informationMisuse-resistant crypto for JOSE/JWT
Misuse-resistant crypto for JOSE/JWT Neil Madden OAuth Security Workshop, 2018 1 JOSE Content Encryption Methods Provide authenticated encryption AES-CBC with HMAC-SHA2 Requires random 128-bit IV Must
More informationdraft-li-intent-classification- 00
draft-li-intent-classification- 00 Chen Li Ying Cheng John Strassner Olga Havel Weiping
More informationInternet Research Task Force (IRTF) Request for Comments: 7418 Category: Informational December 2014 ISSN:
Internet Research Task Force (IRTF) S. Dawkins, Ed. Request for Comments: 7418 Huawei Category: Informational December 2014 ISSN: 2070-1721 Abstract An IRTF Primer for IETF Participants This document provides
More informationKeep your fingers off my keys today & tomorrow
SIGS SE February 2017 Keep your fingers off my keys today & tomorrow Marcel Dasen VP Engineering Securosys SA Keys? Encryption keys asymmetric e.g. RSA, ECC public/private key pairs for wrapping symmetric
More informationRequest for Comments: 2536 Category: Standards Track March DSA KEYs and SIGs in the Domain Name System (DNS)
Network Working Group D. EastLake Request for Comments: 2536 IBM Category: Standards Track March 1999 Status of this Memo DSA KEYs and SIGs in the Domain Name System (DNS) This document specifies an Internet
More informationIntroduction to Security
to Security CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 31 October 2012 CSS322Y12S2L01, Steve/Courses/2012/s2/css322/lectures/introduction.tex,
More informationProposal for an IEEE 802 EC Privacy Recommendation Study Group. 18 th of July 2014
1 Proposal for an IEEE 802 EC Privacy Recommendation Study Group 18 th of July 2014 2 July 14 th Internet Privacy Tutorial Title: Pervasive Surveillance of the Internet Designing Privacy into Internet
More informationETSI ESI and Signature Validation Services
ETSI ESI and Signature Validation Services Presented by: Andrea Röck For: Universign and ETSI STF 524 expert 24.10.2018 CA day ETSI 2018 Agenda Update on standardisation under eidas Signature validation
More informationITU Forum Bridging the ICT standardization & development gap. The Internet Engineering Task Force (IETF) and Internet Standardisation
ITU Forum Bridging the ICT standardization & development gap The Internet Engineering Task Force (IETF) and Internet Standardisation Dawit Bekele Manager, African Regional Bureau Internet Society IETF
More informationHost Identity Protocol
Presentation outline Host Identity Protocol Slides by: Pekka Nikander Ericsson Research Nomadiclab and Helsinki Institute for Information Technology http://www.hip4inter.net 2 What is HIP? Motivation HIP
More informationQuantum-safe hybrid handshake for TLS 1.3
Quantum-safe hybrid handshake for TLS 1.3 Recent updates Sep 2015 Zhenfei Zhang Security Innovation QSH_TLS Run a classical key exchange as usual and obtain a classical premaster secret c; In parallel,
More informationPost-Quantum Cryptography. Dr. Thomas Pöppelmann Infineon Technologies AG
Post-Quantum Cryptography Dr. Thomas Pöppelmann Infineon Technologies AG Agenda 1 Introduction 2 Post-Quantum Cryptography 3 Lattice-Based Cryptography 4 Hash- and Code-Based Cryptography 5 Outlook 2 Agenda
More informationCryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000
Cryptography Trends: A US-Based Perspective Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000 Outline Advanced Encryption Standard Dominant design Thoughts on key size Advanced
More informationThe transition to post-quantum cryptography. Peter Schwabe February 19, 2018
The transition to post-quantum cryptography Peter Schwabe peter@cryptojedi.org https://cryptojedi.org February 19, 2018 About me Assistant professor at Radboud University Working on high-speed high-security
More informationIntroduction to Post-Quantum Cryptography
Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY
More informationIntroduction to Post-Quantum Cryptography
Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students 1 Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY
More informationCryptography for the Internet of Things. Kenny Paterson Information Security
Cryptography for the Internet of Things Kenny Paterson Information Security Group @kennyog; www.isg.rhul.ac.uk/~kp What is the Internet of Things? The Internet of Things (IoT) is the network of physical
More informationThe Coming Design Wars
The Coming Design Wars Deirdre K. Mulligan Kenneth A. Bamberger 4th Annual BCLT Privacy Law Forum Palo Alto, CA March 13, 2015 Governance of the Internet in Flux Shifts across three planes Objectives Actors
More informationCEN & ETSI standards & eidas Compliance
CEN & ETSI standards & eidas Compliance Nick Pope - Thales Vice Chair, ETSI TC Electronic Signature & Infrastructures Jan Ulrik Kjærsgaard Cryptomathic Editor CEN EN 419 241-2 (Remote Signing) eidas and
More information8/30/17. Introduction to Post-Quantum Cryptography. Features Required from Today s Ciphers. Secret-key (Symmetric) Ciphers
CERG @ GMU http://cryptography.gmu.edu Introduction to Post-Quantum Cryptography 10 PhD students 3 MS students Features Required from Today s Ciphers Secret-key (Symmetric) Ciphers STRENGTH PERFORMANCE
More informationInternet Research Task Force (IRTF) Category: Informational April 2017 ISSN:
Internet Research Task Force (IRTF) J. Schmidt Request for Comments: 8125 secunet Security Networks Category: Informational April 2017 ISSN: 2070-1721 Requirements for Password-Authenticated Key Agreement
More informationPractical Experiences with crypto on 8-bit
Practical Experiences with crypto on 8-bit draft-aks-lwig-crypto-sensors-01 Mohit Sethi, Jari Arkko, Ari Keranen, Heidi-Maria Back 1 Public Key Experiences Can we do Public key crypto on (really) small
More informationElaine Barker and Allen Roginsky NIST June 29, 2010
Elaine Barker and Allen Roginsky NIST June 29, 2010 Background: Cryptography is used to protect sensitive information Attackers are becoming smarter, and computers are becoming more powerful Many commonly
More informationETSI ISI-00x : A full set of new standards in Cyber Defence Gerard Gaudin (Chair of ETSI ISG ISI)
ETSI ISI-00x : A full set of new standards in Cyber Defence Gerard Gaudin (Chair of ETSI ISG ISI) ETSI 2017. All rights reserved Reference frameworks missing and hindering IT security controls measurement
More informationEuropean Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU
European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU Hermann Meyer, CEO ERTICO IMPACTS, Barcelona, 31 March 2011 This presentation is mainly based on charts which were already
More informationPolicies in the Quantum era
Policies in the Quantum era Dr Nineta Polemi European Commission DG CNECT/H1 ENISA-FORTH Summer School 2018 Quantum Computer (QC) The Idea: Exploit quantum mechanics to process information The Ambition:
More informationExtended Package for Secure Shell (SSH) Version: National Information Assurance Partnership
Extended Package for Secure Shell (SSH) Version: 1.1 2016-11-25 National Information Assurance Partnership Revision History Version Date Comment 0.9 2015-08-19 First Draft - Extended Package for Secure
More informationLISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008
LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008 1 CONCERNS TO ADDRESS Accurately describe what LISP separates Describe properties of EIDs Discuss overlapping EIDs and RLOCs CHARTER
More informationAbout & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017
About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda Does blockchain secure PKIs in the longterm? Disadvantages of classic PKIs
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationAn Overview of PQC Workshops/Projects and Standardization Concerns in China
An Overview of PQC Workshops/Projects and Standardization Concerns in China Hong Xiang, Tao Xiang Chongqing University Zheng-feng Zhang Institute of Software Chinese Academy of Sciences Zheng-fu Han University
More informationQUANTUM SAFE PKI TRANSITIONS
QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver
More informationOpen Group Security Forum Overview
Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed
More informationErasure Methods. Erasure Process
Date 11/13/2017 Erasure Methods With the advent of advanced drive erasure technologies, simple overwrites are no longer preferred, and yet with multiple competing erasure possibilities, knowing which methods
More informationETSI Electronic Signatures and Infrastructures (ESI) TC
ETSI Electronic Signatures and Infrastructures (ESI) TC Presented by Andrea Caccia, ETSI/ESI liaison to ISO SC27 ( a.caccia @ kworks.it ) ETSI 2011. All rights reserved ETSI TC ESI - Electronic Signatures
More informationTLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key
TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key draft-housley-tls-tls13-cert-with-extern-psk Russ Housley TLS WG at IETF 102 July 2018 TLS 1.3 Authentication and
More informationCryptography and the Internet
Cryptography and the Internet Overview Background Next Generation Encryption Suite B, FIPS-140-2011 Issues Crypto Globalization Quantum Computers Quantum Cryptography Post-Quantum Cryptography Recommendations
More informationInternet Engineering Task Force (IETF) Request for Comments: Category: Informational ISSN: March 2011
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6149 IECA Obsoletes: 1319 L. Chen Category: Informational NIST ISSN: 2070-1721 March 2011 Abstract MD2 to Historic Status This document
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationEU Policy Management Authority for Grid Authentication in e-science Charter Version 1.1. EU Grid PMA Charter
EU Grid PMA Charter This charter defines the policies, practices, and bylaws of the European Policy Management Authority for Grid Authentication in e-science. 1 Introduction The European Policy Management
More informationCountering Cryptographic Subversion. Post-Snowden Cryptography Workshop Brussels 8/12/2015
Countering Cryptographic Subversion Post-Snowden Cryptography Workshop Brussels 8/12/2015 Kenny Paterson Information Security Group @kennyog ; www.isg.rhul.ac.uk/~kp The post-snowden adversary Since the
More informationHost Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 by Pekka Nikander, Andrei Gurtov, and Thomas R. Henderson Johannes Bachhuber Jacobs University
More informationExpires: October 2000 April 2000
INTERNET-DRAFT UPDATES RFC 2535 Donald E. Eastlake 3rd Motorola Expires: October 2000 April 2000 DNS Request and Transaction Signatures ( SIG(0)s ) --- ------- --- ----------- ---------- - ------- -
More informationIRTF Open Meeting. Lars Eggert IRTF Chair IETF-97, Seoul, South Korea
IRTF Open Meeting Lars Eggert IRTF Chair IETF-97, Seoul, South Korea IRTF IPR Policy The IRTF follows the IETF Intellectual Property Rights (IPR) disclosure rules. This is a summary of these rules as they
More informationPublic-Key Infrastructure NETS E2008
Public-Key Infrastructure NETS E2008 Many slides from Vitaly Shmatikov, UT Austin slide 1 Authenticity of Public Keys? private key Alice Bob public key Problem: How does Alice know that the public key
More informationProtocol Integration and Implementation Problems
Protocol Integration and Implementation Problems Bringing PQC into practice Stefan-Lukas Gazdag 5th ENISA/FORTH Summer School, 27th of September 2018 Content Introduction
More informationNetwork Working Group Request for Comments: 5702 Category: Standards Track October 2009
Network Working Group J. Jansen Request for Comments: 5702 NLnet Labs Category: Standards Track October 2009 Abstract Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC This
More informationSession 1. esignature and eseal validation landscape. Presented by Sylvie Lacroix esignature and eseal validation workshop, Jan
Session 1 e and eseal validation landscape Presented by Sylvie Lacroix e and eseal validation workshop, Jan 10 2018 Legal Framework: eidas Regulation and e Validation as a (qualified) Trust Service (link
More informationSecurity Baseline Data Model for Network Infrastructure Device draft-xia-sacm-nid-dp-security-baseline-00 draft-dong-sacm-nid-cp-security-baseline-00
Security Baseline Data Model for Network Infrastructure Device draft-xia-sacm-nid-dp-security-baseline-00 draft-dong-sacm-nid-cp-security-baseline-00 Liang Xia Guangying Zheng Yue Dong Huawei Huawei Huawei
More informationInternet Engineering Task Force (IETF) Category: Standards Track March 2011 ISSN:
Internet Engineering Task Force (IETF) D. McGrew Request for Comments: 6188 Cisco Systems, Inc. Category: Standards Track March 2011 ISSN: 2070-1721 Abstract The Use of AES-192 and AES-256 in Secure RTP
More informationSDN RG IAB Review. Daniel King (SDN RG Chair) IETF 94 Yokohama
SDN RG IAB Review Daniel King (SDN RG Chair) d.king@lancaster.ac.uk IETF 94 Yokohama Nanos gigantum humeris insidentes Standing on the shoulders of giants Previous (founding) SDN RG Chairs: Nick Feamster
More informationCall for submissions by the UN Special Rapporteur on Freedom of Expression
1 November 2016 Call for submissions by the UN Special Rapporteur on Freedom of Expression Study on freedom of expression and the telecommunications and internet access sector Internet Society submission
More informationInternetworking. from the Webopedia Computer Dictionary
Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely
More informationThe State of Post- Quantum Cryptography. Presented by the Quantum Safe Security Working Group
The State of Post- Quantum Cryptography Presented by the Quantum Safe Security Working Group 2018 Cloud Security Alliance All Rights Reserved. You may download, store, display on your computer, view, print,
More informationRevision History Revision 0 (T10/06-225r0): Posted to the T10 web site on 4 May 2006.
To: INCITS T10 Committee From: Matt Ball, Quantum Corporation Date: March 13, 2007 Subject: SSC-3: Key Entry using Encapsulating Security Payload (ESP) Revision History Revision 0 (T10/06-225r0): Posted
More informationNETWORK SECURITY & CRYPTOGRAPHY
Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter
More informationIntroduction to the DANE Protocol And Updates From IETF 88
Introduction to the DANE Protocol And Updates From IETF 88 Dan York, Senior Content Strategist Internet Society ICANN 48, Buenos Aires, Argentina November 20, 2013 A Quick Overview of DANE www.internetsociety.org
More informationA Reference Model for Autonomic Networking draft-behringer-anima-reference-model-00.txt
A Reference Model for Autonomic Networking 92 nd IETF, 27 Mar 2015 Michael Behringer Brian Carpenter Toerless Eckert 1 Background History A Framework for Autonomic Networking Jun 2012 draft-behringer-autonomic-network-framework-00.txt
More informationA Cross-Sector Perspective on Product Cyber Security
A Cross-Sector Perspective on Product Cyber Security Dr Robert Oates Software Centre of Excellence, Rolls-Royce plc 2016 Rolls-Royce plc The information in this document is the property of Rolls-Royce
More informationIdentity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition
Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization
More information1 Purpose of this document
1 Purpose of this document Many of the smartcard products or similar devices implement cryptographic operations that are subject to attacks such as fault injection and side-channel attacks at a high attack
More informationDocument Shepherds: Doing it well
Document Shepherds: Doing it well IETF 2015 - Routing WG Chair Training Acee Lindem Ines Robles 1 Content What is a Document Shepherd Write-Up? When is the right moment to do a Doc. Shepherd? Stages in
More informationHow to make Secure Easier to use
How to make Secure Email Easier to use Simson L. Garfinkel (MIT) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon) Robert C. Miller (MIT) http://www.simson.net/smime-survey.html/
More informationCRYPTOGRAPHY. BY, Ayesha Farhin
CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer
More informationInternetworking. from the Webopedia Computer Dictionary
Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely
More informationSSL/TSL EV Certificates
SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo
More informationOur Work at The Internet Society
Our Work at The Internet Society Join us to keep the Internet open, thriving, and benefitting people around the globe. June 2015 Dushanbe Tajikistan Maarit Palovirta Naveed Haq Internet Society The Internet
More informationOutline. WEP privacy. Side-channel attacks. WEP shared key. WEP key size and IV size. Crypto failures, cont d
Outline CSci 5271 Introduction to Computer Security Day 21: Firewalls, NATs, and IDSes Stephen McCamant University of Minnesota, Computer Science & Engineering Side-channel attacks Timing analysis: Number
More informationSTRONG DATA PRIVACY AND SECURITY FOR THE IOT
STRONG DATA PRIVACY AND SECURITY FOR THE IOT François Ambrosini, ETSI TC CYBER STF 529, IBIT Ambrosini UG Extending access control in onem2m systems with Attribute Based Encryption Outline Introduction
More informationAn Update on ETSI ISG QKD
An Update on ETSI ISG QKD Andrew Shields (Chair) Industry Specification Group in Quantum Key Distribution Global Deployments of QKD EU Flagship Programme UK Quantum Network TREL Tokyo QKD Network Cambridge
More informationAutokey Version 2 Specification
Autokey Version 2 Specification draft-sibold-autokey-00 Authors: Dr. D. Sibold PTB, Stephen Röttger IETF 85, Atlanta, USA, November 4 9, 2012 Introduction Scope: Autokey V2 shall provide Authenticity of
More informationPublic-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7
Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7 David Cash University of Chicago Plan 1. Security of RSA 2. Key Exchange, Diffie-Hellman 3. Begin digital
More informationCloud Security Alliance Quantum-safe Security Working Group
Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security
More informationNetwork Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo
Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the
More informationTrusted Platform for Mobile Devices: Challenges and Solutions
Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New
More informationCryptography: It is not just about Algorithms
Cryptography: It is not just about Algorithms Aims of Lecture To enjoy ourselves To look at some implementation issues for cryptographic systems To look at some recent attacks on systems that were assumed
More informationSoftware Development for B92 Quantum Key Distribution Communication Protocol
Software Development for B92 Quantum Key Distribution Communication Protocol Shirantha Wijesekera Dr. Sajal Palit Dr. Bala Balachandran University of Canberra University of Canberra University of Canberra
More informationOpening Address. Professor L A Clark OBE, FREng. Professor of Structural Engineering, The University of Birmingham
Opening Address Professor L A Clark OBE, FREng Professor of Structural Engineering, The University of Birmingham Chairman of the Thaumasite Expert Group Report Abstract Professor Clark will give an outline
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More information