Performance Evaluation of SSL with New Client Authentication

Size: px
Start display at page:

Download "Performance Evaluation of SSL with New Client Authentication"

Transcription

1 University of Aizu, Grauation hesis. March, 2005 s Performance Evaluation of SSL with New Client Authentication akuya Yahagi s Supervise by iroshi oyoizumi Abstract he purpose of this paper is to fin effective use of Secure Socket Layer(SSL) with Feige-Fiat-Shamir Ientification Protocol for client authentication, which prove one s ientity without its knowlege. his protocol has 50% chance of fining malicious user per one trial, an it becomes better by increasing the number of trials. In this paper, we fin most effective point of number of trials by trae-off between probability of fining malicious user an processing time. 1 Introuction Many people connect PC to Internet an communicate information. When we communicate information on the Internet, there is a anger of eavesropping, spoofing, an so on. For example when a client who is mail user receives mail from a server who provies mail service, the client sens user name an passwor. he eavesropper is able to know the user name an passwor easily. When the client sens mail, the server oesn t certify the sener s ientity. It means that any person can use others mail aress. In fact, phishing mail, spam, an some kin of virus mail use others mail aress or nonexistent mail aress. For example, phishing mail is sent by an other host using well-known bank s, creit car company s, an Internet shopping site s mail aress. Cryptography protects information from such anger. Secure Socket Layer(SSL) [2] provies cryptography communication for mail, WWW, an so on. SSL has three steps to begin cryptography communication: authentication, key exchange, an encrypting. First, the client checks the server s ientification in the authentication step, Secon, the client exchanges key which is use to encipher message. Finally the client an the server begin to communicate using cryptography. In the authentication step, SSL uses Digital Signature to certify. Digital Signature contains personal information, so this metho is usually use to certify the server an not goo to certify the client. But if there is no client authentication, a malicious person may try to spoof, an use your mail aress. So it requires client authentication. Sener ID [5] is a metho for preventing spoofing mail by checking sener s mail aress an IP aress. Sener ID asks omain part of mail aress for Domain Name System(DNS), an then checks returne IP aress is same as sener s IP aress. If IP aress is not same, mail is rejecte. his metho is base on the integrity of IP aress, but if IP aress is also forge, this metho can t prevent spoofing. Some methos for client authentication such as Rivest Shamir Aleman (RSA) authentication, Challenge anshake Authentication Protocol (CAP), an so on are available, but we use Feige-Fiat-Shamir Ientification Protocol [6]. his metho can prove ientity via emonstration of knowlege of secret without revealing even a single bit of secret. owever, when some malicious person tries to be an authenticate user, this Protocol has a 50% chance of fining an malicious user per one trial. Increasing the number of trials, the probability of fining the malicious user becomes larger, while time for confirmation gets longer. So it is necessary to fin most effectual number of trials. he purpose of this research is to evaluate performance of SSL with Feige-Fiat-Shamir Ientification Protocol. In this paper, we moel SSL with authentication using M/G/1 queue to calculate the waiting time an fin effectual metho for its use by trae-off between probability of fining malicious user an waiting time. 2 SSL SSL is use for cipher communication. For example, there are two entities, a server who provies mail service, an a client who wants to sen mail using the cryptography. o begin cryptography communication, client an server have to ecie specification of cryptography such as cryptography algorithms, an metho of key exchange. In SSL, the client an server sen some messages to ecie specification(see figure 1). First, the client sens Client hello (1) which contains ranom values an available encryption algorithms list, key exchange algorithms list an so on to server. he server respons Server hello (2) which contains ranom values an selecte algorithm, an also sens Server certificate an Server hello one to the client. Client verifies server s ientification by checking the Server certificate. he server certificate contains a public key which is necessary to exchange common key. Messages after Server certificate are encrypte using public key an sent to server. If there is no public key in Server certificate or the server oesn t sen Server cer-

2 University of Aizu, Grauation hesis. March, 2005 s tificate, server sens Server key exchange to create public key. hen server sens Server hello one to finish ello phase. In ello phase, the server sens certificate to prove his ientity, but the client oesn t prove ientity. Next, client sens Client key exchange (3) incluing premaster secret which is to create common key, Change cipher spec (4) an Finishe. Change cipher spec is signal transition in ciphering strategies. Server also sens Change cipher spec an Finishe an begins to communicate encrypte application ata. In this case, server oesn t check ientification of client. here is the possibility that a malicious person tries to spoof. So it requires client authentication. Client Client hello (1) Client Certificate Server hello Server Certificate(2) Server hello one Client key exchange Change cipher spec Finishe (3) Change cipher spec Finishe (4) Server Figure 1: SSL with no client authentication 3 Authentication Metho One of the authentication methos is Arbitrate Protocols. Arbitrate Protocols is suite for ientification of owner of a creit car, ID car, or computer account. In the Arbitrate Protocols, Feige-Fiat-Shamir Ientification Protocol [6] can prove ientity via emonstration of knowlege of secret such as Personal Ientification Number(PIN) or passwor without revealing even a single bit of secret. 3.1 Feige-Fiat-Shamir Ientification Protocol Suppose that there are two persons, Alice an Bob, an Alice wants to prove her ientification by proving that she knows a secret to Bob. his metho checks that she can calculate some value base on secret number. She has secret number an opens remainer of square of secret number ivie by n, where n is large number. Bob checks she can calculate value or not using this open value. e can t fin secret number from open value. Before Alice proves her ientification to Bob, they nee to register their secrets to truste a thir person, rent. Registration stage is following: (1) rent chooses a moulus l = pq, where p an q are large prime an roughly same size numbers to be kept secret an number of trials n. (2) Alice an Bob respectively ranomly select secret natural numbers s A an s B l 1 with gc(s A s B, l) = 1. (3) Alice an Bob compute respectively the smallest natural numbers t A an t B such that t A = s 2 A mo l an t B = s 2 B mo l an resister secrets s A an s B with rent t A an t B on t nee to be kept secret After Registration stage, to prove ientification of Alice to Bob, they implement following steps: (1) Alice selects an m, such that m l 1 an sens w = m 2 mo l to Bob (2) Bob chooses c = 0 or 1 an sens it to Alice (3) Alice computes r = ms c A mo l an sens it to Bob (4) Bob computes r 2 mo l (a) If r 2 = wt c A then i. if n = 0 then terminates this protocol an accepts Alice. ii. else n = n 1 an go to step (1) (b) If r 2 wt c A then terminates this protocol an rejects Alice Figure 2 shows the example of this protocol, when p an q are 17 an 13 an l = 221. Preliminarily, Alice an Bob chooses s A = 16 an s B = 15 an calculates t A = 16 2 mo 221 = 35 an t B = 15 2 mo 221 = 4. Alice chooses m = 219 an calculates w = mo 221 = 4, an then sens w = 4 to Bob. Bob chooses c = 1 an sens it to Alice. Alice calculates r = mo 221 = 189 an respons it to Bob. Bob calculates mo 221 = 140 an wt c A = = 140, an then checks that r 2 mo l equals wt c A or not. In this case r 2 mo l = wt c A, an Alice passes this trial.

3 Z Z Y X X Z / ' # = " <! c h h f h? DC > > I? e M S > Ž { Œ z ˆ { µ ± ± ² ² ² { { z University of Aizu, Grauation hesis. March, 2005 s Y A JW > NLO JW EFG E*FG MM 6 / 354 # $&% #% 87 (-)+. #, 2 /10 (*)&+ 95:; '&' f ] blc_*`a ] b [ _`a \\^] E*FG E*FG JILK NLO&P Q&R EF&G E*FGMM MM VU JILK NLO JILK EFG EFG MM MM EFG ikj l lmnlo pqmr ² L ª * ³ ««^ sutlvkwlx y y v v ~ ƒ - } Œ* Š Lž L ŸŸ ŸŸ Lž L L L ŸŸ ŸŸ š œ Figure 2: Feige-Fiat-Shamir Ientification Protocol example 3.2 Spoofing Metho Suppose a malicious person Mallory tries to spoof Alice, an oesn t know s A. hough, he has a chance of passing this trial with following steps: e selects an m such that 0 < m < l 1 an sens: (1) w = m 2, if he guesses that Bob will sen c = 0 (a) If Bob chooses c = 0, then Mallory sens r = m Bob computes r 2 = m 2 = wt 0 A mo l an accepts Mallory (b) If Bob chooses c = 1, then Mallory can t sen r = ms c A an Bob rejects Mallory (2) w = m 2 t 1 A, if he guesses that Bob will sen c = 1 (a) If Bob chooses c = 0, then Mallory can t sen r such that r 2 = wt c A an Bob rejects Mallory (b) If Bob chooses c = 1, then Mallory sens r = m Bob computes r 2 = m 2 = wt 1 A t1 A = wt1 A mo l an accepts Mallory his means that Mallory has a 50% chance of passing this Protocol per one trial [6]. Figure 3 shows example spoofing when Mallory guesses that Bob will sen c = 1 an hits his guess. Mallory selects m = 70, calculates w = = 140 an sens it to Bob. Bob selects c = 1 as he expecte. Mallory respons r = m = 70. Bob calculates r 2 mo l = 38 an wt c A mo l = 38. hen Mallory can pass this trial without s A. 4 Moeling Figure 3: Spoofing example he probability of fining Mallory becomes larger by increasing the number of trials, but it takes a great eal of time. So we have to think the trae-off between the probability of fining an waiting time. In this section, we calculate probability of fining, moel SSL an SSL with authentication protocol using M/G/1 queue an then obtain these waiting time to compare an evaluate waiting time of SSL with SSL with authentication. 4.1 Data capture o calculate waiting time of SSL, we nee to know service time of SSL s S S L. We buil a simple network which consists of client an mail server applie SSL to obtain service time of SSL. Client reserves mail from server an capture these packets using Sniffer [8]. hen we check time of each packet arrives to client. Figure 4 shows service time of each section of SSL. 4.2 Waiting time of SSL We consier the mean waiting time of SSL. Figure 5 shows SSL service an its waiting time of each client. First client C1 comes to server an receives SSL service. Before completion C1 s SSL communication, C2 comes to server an he has to wait until C1 finishes service. After C1 leaves server, C2 begins to receive service an also C3 comes to server in the mile of C2 s service. We efine time from client arrives server to leaves as waiting time of SSL. o be serve client an server always sen same number of messages, so we suppose that service time of SSL is same. Let N S S L be a number of client, λ be a rate of incoming client an 1 µ be a service time of SSL. By Pollaczek-Khinchin formula [9] for M/G/1 queues, expectation value of number of SSL clients is

4 ) University of Aizu, Grauation hesis. March, 2005 s º» ¹ º»½¼-¾ ÃÅÄ Æ Ç½ÈÀÉËÊ Ç Ä ÄÍÌ ÎÐÏ^ÑLÒ Ï^ÑÐÓ ÏÕÔ ÔLÖ Ï ÑØ&ÙÚ Ù Û Ü Ø Ï ÎÐÏÕÑÒ Ï^ÑÐÓ ÏÕÔ ÔLÖÞÝ Ö ß Ï àåá â ãõäæåç ã^è ãõéê½ë*ì ä í ã à ëì ä í ã ê â î ë ãõïñð î ã ê ò â ä â ð ë ã5ó ôöõø ^ùøúëûü½ýuþ õ û^ÿ þ û ü ý ù ý õ û À»½ÁLÂÀ»½Á Figure 4: Service time of SSL 4.3 Waiting ime of SSL with Authentication Next, we consier the mean waiting time of SSL with authentication. As section 4.2, service time of SSL is always same, but service time of authentication changes by number of trials up to fin Mallory. First we fin expectation an variance of number of trials. Let N M be a Mallory s number of trials, N A be a Alice s number of trials, x be a probability of fining Mallory per one trial which is 50% in section 3, an n be a number of trials. Expectation value of Mallory s number of trials is E[N M ] = = an the variance is n kx(1 x) k 1 + n(1 x) n k=1 1 (1 x)n, (3) x where E[N S S L ] = ρ + ρ2 + λ 2 σ 2 2(1 ρ), (1) ρ = λ µ. Since service time of SSL is always same, variance of service time σ 2 = 0, then by Little s formula [9], we obtain expectation of waiting time of SSL by E[Y S S L ] = 2 ρ 2µ(1 ρ), (2) where Y S S L represents waiting time of SSL. "# "$ ) )! ) %! "+* "-,./1032 ) * ) A*3&/1BDC&.EF/ 2G. :;/=<3>? &@ &% "! "$% "(' Figure 5: State of each client receives SSL service ) ' ' Var[N M ] = n k 2 x(1 x) k 1 + (E[N M ]) 2 k=1 = 1 x x 2 (2n 1)x(1 x)n x 2 (1 x)2n x 2. (4) Since Alice always passes this trial, Alice s mean number of trials E[N A ] is n, an variance Var[N A ] is 0. hen expectation value an variance of Mallory s service time of SSL with authentication are an E[S M ] = s auth E[N M ] + s S S L, (5) Var[S M ] = s auth Var[N M ], (6) where s auth an s S S L are service time of trial an SSL, an S M represents Mallory s service time of SSL with authentication. Similarly, expectation value an variance of Alice s whole service time are an E[S A ] = s auth E[N A ] + s S S L, (7) Var[S A ] = s auth Var[N A ] = 0, (8) where S A is Alice s service time of SSL with authentication. Next, we fin whole service time. Let α% are Mallory in all users, 1 µ be a average of service time an σ2 be a

5 University of Aizu, Grauation hesis. March, 2005 s variance of service time. Whole expectation value an variance of service time are following: 1 µ = (αe[s M] + (1 α)e[s A ]) + S S S L, (9) σ 2 = αvar[s M ] + (1 α)var[s A ] +α(e[s M ]) 2 + (1 α)(e[s A ]) 2 αe[s M ] + (1 α)e[s A ]) 2. (10) By Pollaczek-Khinchin formula, expectation value of number of clients is E[N auth ] = ρ + ρ2 + λ 2 σ 2 2(1 ρ), (11) where ρ = λ µ, an N auth is number of client. By Little s formula, expectation value of waiting time of SSL with authentication is obtaine by E[Y auth ] = E[N auth], (12) λ where Y auth is waiting time of SSL with authentication. 4.4 Probability of missing Mallory Also we consier the probability of missing Mallory. he probability of failing to fin Mallory per one trial is represente by 1 x then probability of missing Mallory in n trials is 5 Results p(n) = (1 x) n. (13) Figure 6 shows graphs of the mean waiting time of SSL an SSL with authentication with number of trials n = 5, n = 15, an n = 20, when x = 0.5, α = 0.01, s S S L = , an s auth = using equation (2) an (12). Figure 7 shows graphs of probability of missing Mallory with x = 0.5 represente by (13). Probability of missing Mallory when n = 5 is , n = 15 is an n = 20 is Capacity of server applie SSL an authentication with n = 5 is large, on the other han probability of miss when n = 5 has %. When n = 20, probability of miss is enough small, but capacity of server is not sufficient. SSL with authentication when n = 15 is effective with waiting time an probability of fining point of view. Waiting time Λ No auth n 5 n 15 n 20 Figure 6: hese graphs are waiting time of SSL with no authentication, SSL with authentication n = 5, n = 15 an n = 20 the orer from the right p n Figure 7: Probability of missing Mallory 6 Conclusion an Future Works We fin effective point of number of trials n = 15 by trae of between probability of fining Malloy an waiting time. Riing on the feature of this authentication which can prove ientity without sening any personal information to server, client can use client authentication more securely. Further, this metho is solution to IP aress spoofing which is problem of Sener ID. Using this metho, server can apply client authentication to SSL effectively an securely. owever, service time of authentication s Auth an probability of incoming Mallory α is not accurate value. We nee to capture these ata in the future. Acknowlegement I woul like to thank Prof. iroshi oyoizumi for his avice on this research, an Prof. Martha Clark Cummings for her help with the writing of this paper. Also I woul like to thank member of Performance Evaluation Laboratory for their help. n

6 University of Aizu, Grauation hesis. March, 2005 s References [1] CNE Japan, 0, , ,00.htm,. [2] A. O. Freier, P. Karlton, an P. C. Kocher, he SSL Protocol Version 3.0, [4] M. Lentczner an M. Wong, Sener Policy Framework: Authorizing Use of Dmains in MAIL FROM raft-lentczner-spf-00, Internet-Draft,. [5] J. Lyon an M. Wong, Sener ID: Authenticating , Internet-Draft,. [6] R. A. Mollin, Rsa an Public-Key Cryptography(Discrete Mathematics an Its Applications), Chapman & all, [7] S. M. Ross, Applie Probability Moels With Optimization Applications, Dover Pubns, [8] Sniffer echnologies, [9]. oyoizumi, Performance Evaluation, toyo/lectures/pe/pe-ex.htm..

How to Make E-cash with Non-Repudiation and Anonymity

How to Make E-cash with Non-Repudiation and Anonymity How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1 Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

Number Theoretic Attacks On Secure Password Schemes

Number Theoretic Attacks On Secure Password Schemes Number Theoretic Attacks On Secure Passwor Schemes Sarvar Patel Bellcore Math an Cryptography Research Group 445 South St, Morristown, NJ 07960, USA sarvar@bellcore.com Abstract Encrypte Key Exchange (EKE)

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

Computer Security Fall 2006 Joseph/Tygar MT 2 Solutions

Computer Security Fall 2006 Joseph/Tygar MT 2 Solutions CS 161 Computer Security Fall 2006 Joseph/Tygar MT 2 Solutions Problem 1. [Covert Channels] (30 points) (a) (5 points) Write down the Fiat-Shamir zero-knowledge protocol (as presented in class) where Alice

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital

More information

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information

Public Key Cryptography and the RSA Cryptosystem

Public Key Cryptography and the RSA Cryptosystem Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor Identification (User Authentication) Fiat-Shamir Scheme Lecture 12 Tel-Aviv University 4 January 2010 Model and Major Issues Alice wishes to prove to Bob

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,

More information

Second Year March 2017

Second Year March 2017 Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

r v i e w o f s o m e r e c e n t d e v e l o p m

r v i e w o f s o m e r e c e n t d e v e l o p m O A D O 4 7 8 O - O O A D OA 4 7 8 / D O O 3 A 4 7 8 / S P O 3 A A S P - * A S P - S - P - A S P - - - - L S UM 5 8 - - 4 3 8 -F 69 - V - F U 98F L 69V S U L S UM58 P L- SA L 43 ˆ UéL;S;UéL;SAL; - - -

More information

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

CS Computer Networks 1: Authentication

CS Computer Networks 1: Authentication CS 3251- Computer Networks 1: Authentication Professor Patrick Traynor 4/14/11 Lecture 25 Announcements Homework 3 is due next class. Submit via T-Square or in person. Project 3 has been graded. Scores

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Chapter 9 Public Key Cryptography. WANG YANG

Chapter 9 Public Key Cryptography. WANG YANG Chapter 9 Public Key Cryptography WANG YANG wyang@njnet.edu.cn Content Introduction RSA Diffie-Hellman Key Exchange Introduction Public Key Cryptography plaintext encryption ciphertext decryption plaintext

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

HoneyBee User s Guide

HoneyBee User s Guide HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is

More information

Bold U S E R S G U I D E

Bold U S E R S G U I D E Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

P2_L8 - Hashes Page 1

P2_L8 - Hashes Page 1 P2_L8 - Hashes Page 1 Reference: Computer Security by Stallings and Brown, Chapter 21 In this lesson, we will first introduce the birthday paradox and apply it to decide the length of hash, in order to

More information

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

Cassandra: Distributed Access Control Policies with Tunable Expressiveness Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

CS 425 / ECE 428 Distributed Systems Fall 2017

CS 425 / ECE 428 Distributed Systems Fall 2017 CS 425 / ECE 428 Distributed Systems Fall 2017 Indranil Gupta (Indy) Dec 5, 2017 Lecture 27: Security All slides IG Security Threats Leakage Unauthorized access to service or data E.g., Someone knows your

More information

1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize?

1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize? Introduction Answer the following questions. When a word count restriction is given for a question, exceeding it will result in marks being deducted. If your answer is more than twice the maximum length,

More information

Banks Tupas Certification Service for Service Providers

Banks Tupas Certification Service for Service Providers Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 3, Issue 6, Dec -Jan, 2016

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 3, Issue 6, Dec -Jan, 2016 An Efficiency Analysis For Data Hiding With Use of Random Key over Rivest-Shamir-Adleman Algorithm Sunita Rani 1, Savita 2 School of Engineering&Sciences, Bhagat Phool Singh Mahila Vishwavidyalaya, Khanpur

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 4, 2017 CPSC 467, Lecture 11 1/39 ElGamal Cryptosystem Message Integrity and Authenticity Message authentication codes

More information

Adorn. Slab Serif Smooth R E G U LAR. v22622x

Adorn. Slab Serif Smooth R E G U LAR. v22622x s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,

More information

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

Proxy Cryptography Revisited

Proxy Cryptography Revisited Proxy Cryptography Revisite nca Ivan, Yevgeniy ois epartment of Computer Science Courant Institute of Mathematical Sciences New York University, New York, NY 10012 ivan,ois @cs.nyu.eu bstract In this work

More information

KbdKaz 500 layout tables

KbdKaz 500 layout tables a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A

More information

Chapter 9. Public Key Cryptography, RSA And Key Management

Chapter 9. Public Key Cryptography, RSA And Key Management Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on

More information

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC. Encryption Providing Perfect Secrecy Presented at Calgary Unix Users Group. November 27, 2001 by: Mario Forcinito, PEng, PhD With many thanks to Prof. Aiden Bruen from the Mathematics Department, University

More information

Zero Knowledge Protocol

Zero Knowledge Protocol Akash Patel (SJSU) Zero Knowledge Protocol Zero knowledge proof or protocol is method in which a party A can prove that given statement X is certainly true to party B without revealing any additional information

More information

Version /10/2015. Type specimen. Bw STRETCH

Version /10/2015. Type specimen. Bw STRETCH Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a

More information

Adorn. Serif. v x. user s gu ide

Adorn. Serif. v x. user s gu ide Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously Exchanging keys and public key encryption Public Key Encryption pk sk Public Key Encryption pk cß Enc(pk,m) sk m Public

More information

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos ECE596C: Handout #9 Authentication Using Shared Secrets Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we introduce the concept of authentication and

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,. Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

Sheila. Regular Bold. User s Guide

Sheila. Regular Bold. User s Guide Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your

More information

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall

The Network Security Model. What can an adversary do? Who might Bob and Alice be? Computer Networks 12/2/2009. CSC 257/457 - Fall The Network Security Model Bob and lice want to communicate securely. Trudy (the adversary) has access to the channel. Kai Shen lice data channel secure sender data, control s secure receiver Bob data

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline ZKIP Other IP CPSC 467b: Cryptography and Computer Security Lecture 19 Michael J. Fischer Department of Computer Science Yale University March 31, 2010 Michael J. Fischer CPSC 467b, Lecture 19

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

COIN FLIPPING BY TELEPHONE

COIN FLIPPING BY TELEPHONE COIN FLIPPING BY TELEPHONE A protocol for solving impossible problems Based on Manuel Blum's Paper from 1981 Proved useful for: - Mental poker - Certified Mail - Exchange of Secrets Table of Contents Application

More information

ASYMMETRIC CRYPTOGRAPHY

ASYMMETRIC CRYPTOGRAPHY ASYMMETRIC CRYPTOGRAPHY CONTENT: 1. Number Theory 2. One Way Function 3. Hash Function 4. Digital Signature 5. RSA (Rivest-Shamir Adleman) References: 1. Applied Cryptography, Bruce Schneier 2. Cryptography

More information

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION. Mihir Bellare UCSD 1 ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD 1 Recommended Book Steven Levy. Crypto. Penguin books. 2001. A non-technical account of the history of public-key cryptography and the colorful characters

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

Diffie-Hellman. Part 1 Cryptography 136

Diffie-Hellman. Part 1 Cryptography 136 Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for

More information

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 2 Due: Friday, 10/28/2016 at 11:55pm PT Will be posted on

More information

What did we talk about last time? Public key cryptography A little number theory

What did we talk about last time? Public key cryptography A little number theory Week 4 - Friday What did we talk about last time? Public key cryptography A little number theory If p is prime and a is a positive integer not divisible by p, then: a p 1 1 (mod p) Assume a is positive

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

Securing Internet Communication: TLS

Securing Internet Communication: TLS Securing Internet Communication: TLS CS 161: Computer Security Prof. David Wagner March 11, 2016 Today s Lecture Applying crypto technology in practice Two simple abstractions cover 80% of the use cases

More information

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted

More information

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco

More information

Adorn. Slab Serif BOLD. v x. user s gu ide

Adorn. Slab Serif BOLD. v x. user s gu ide Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions

More information

PROVING WHO YOU ARE TLS & THE PKI

PROVING WHO YOU ARE TLS & THE PKI PROVING WHO YOU ARE TLS & THE PKI CMSC 414 MAR 29 2018 RECALL OUR PROBLEM WITH DIFFIE-HELLMAN The two communicating parties thought, but did not confirm, that they were talking to one another. Therefore,

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information