Secure Mobile Commerce based on XML Security

Size: px
Start display at page:

Download "Secure Mobile Commerce based on XML Security"

Transcription

1 Secure Mobile Commerce based on XML Security JOO-YOUNG LEE, KI-YOUNG MOON, and SUNG-WON SOHN Information Security Technology Division Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA etri.re.kr Abstract: - Companies across the world are turning to mobile commerce because mobility brings competitive advantages through personal contact, resource flexitbility and streamlined processes enabling comapanies to enhance revenue generation. Therefore success in the mobile commerce is dependent on the development and deployment of an end-to-end security solution that protects wireless network, devices, application and data. In order to fulfill such needs, currently some security technologies have been developed. While there are a plethora of security tools on the market, no one has offered an end-to-end security solution tailored to the specific demands of wireless environment. Therefore, in this paper, we ll propose an XML security method to help the secure mobile commerce and discuss some implementation issues to bring the XML security to mobile devices. As it allows protecting the data not only transferred over the network, but also stored within devices, it can provide end-to-end security. Additionally it serves full compatibility, flexibility, and extensibility by using XML. Key-Words: - XML Security, Wireless Devices, Mobile Commerce, Java 1 Introduction Companies across the world are turning to mobile commerce because mobility brings competitive advantages through personal contact, resource flexitbility and streamlined processes enabling comapanies to enhance revenue generation. But wireless e-business creates a whole new set of security risks and challenges. So they want to keep private, such as mobile e-commerce transactions, , and corporate data transmissions. Therefore success in the mobile environment is dependent on the development and deployment of an end-to-end security solution that protects your wireless network, devices, application and data[1]. However, wireless devices, including cellular phones and personal digital assistant (PDA) with Internet access, were not originally designed with security as a top priority. Furthermore most mobile devices have little or no built-in security functions. Users who chose to deactivate their passwords could inadvertently allow unauthorized access to applications and plain data in device. Additionally wireless devices may have Over The Air (OTA) remote configuration facilities that could be exposed and abused. In such a situation, success hinges upon careful selection of feature subsets without destroying compatibility. Any gap in defenses could be exploited to the detriment of companies, so organizations urgently need an end-to-end security strategy for mobile e-business. End-to-end security and full compatibility with large installed base of secure web severs are compelling reasons to consider the existing security solution for wireline, such as SSL/TLS for next generation wireless devices. However, each wireless security has it shortcomings. For example, SSL is too heavy weight for comparatively weak CPUs, low bandwidth, and high latency wireless system. For the reason, it is challenging to implement security in small foot-print devices with low processing power and small memory capacities and that use unreliable, low bandwidth networks. In this paper, we ll propose an XML security method for wireless devices to help the secure mobile commerce and discuss some implementation issues to bring the XML security to mobile devices. As it allows protecting the data not only transferred over the network, but also stored within devices, it can provide end-to-end security. Additionally it serves full compatibility, flexibility, and extensibility by using XML. 2 Related Works Currently some security technologies have been developed for wireless network and devices. While

2 there are a plethora of security tools on the market, until now no one has offered an end-to-end security solution tailored to the specific demands of wireless environment. 2.1 WAP based on WTLS Wireless Transport Layer Security (WTLS) is similar to the Internet s transport layer security protocol. It provides authentication, data integrity, and private services within wireless technologies limited processing power, memory capacity, and bandwidth[2]. But because many e-commerce and corporate sites use SSL-based security, a transmission to such a site from WAP phone must first pass through a gateway that converts the encryption formatting from WTLS to SSL. During this conversion process, however, the message is very briefly unencrypted and thus is subject to interception. 2.2 SSL for small devices Secure Socket Layer (SSL) for small devices may be one solution. It not only offers authentication, data integrity, and private services, but also clears the above-mentioned problem that may happen during conversion processing[3]. But it is too heavy weight for comparatively weak CPUs and low-bandwidth, high latency wireless networks and chatty handshakes involve some long messages. Additionally SSL memory requirements, both static and runtime, are known to be high. 3 Security Issues for Mobile Commerce Customers demand for an end-to-end package that allows security policies already in place for wired networks to be extended to wireless network. In order to provide end-to-end wireless security, it is necessary to cover all of these following issues. 3.1 Authentication Authentication is to ensure that users, clients and servers establish their identity. At some fundamental level, you want to be sure that the people you deal with are really who they say they are. The process of proving identity is called authentication[4]. A key aspect of security for activities such as mobile e-commerce and mission critical corporate communications is the ability to authenticate a message sender s identity. A failure of authentication can easily lead to violations of confidentiality, integrity, and availability. For example, protecting your secrets with encryption does little good if the true identity of your recipient is not what you anticipated. Digital signatures are used to identify the author of a message; people who receive the message can verify the identity of the person who signed them. They can be used in conjunction with passwords or as an alternative to them. 3.2 Confidentiality Confidentiality is to prohibit eavesdropping during data communication or disclosure from application or storage media[4]. It is important to protect the confidentiality of the data held in device. Data must be kept private, safe from interception and only available to users that are authorized to access it. One solution is protecting within the device any long-term keys used to encrypt private data. However, while it is straightforward to protect the confidentiality of wireless traffic, it is much harder to protect the confidentiality of the information held in the devices themselves. 3.3 Data Integrity Integrity is to verify that data has not been altered in transit by a third party, and to prevent forgery and unauthorized alteration[4]. Data must not be tampered with, because if it is modified it can become useless or dangerous, for example, false stock exchange information. Any electronic communication contains a theoretical risk that the data could be corrupted while in transit. The basic integrity problem is to ensure that the message from one principal to another are not corrupted by a malicious third principal. 3.4 Non-Repudiation Parties of a transaction need to be able to confirm the identities of the other parties and the date and time of the transaction[5]. For example a service provider may want to prove to its customer that a human, in which case the authentication mechanism must verify that it is a valid computer belonging to the legitimate organization. Non-repudiation is to prevent parties from falsely denying data transactions after they were supposedly done, enforcing accountability for electronic transactions. 3.5 Availabilty Availability is violated when the system is prevented from performing its intended function, as when someone brings down the web site of an online

3 store[5]. Data and machines must be accessible when needed. If resources are not available there is denial of service, which may cause frustration and financial loss. In some cases such as systems that are connected to production lines, where continuous service is essential denial of service has much more serious consequences. 4 XML Security for Mobile Commerce Security protocols dominant on the Internet commonly perceived as too big for small devices, and today s wireless architectures are proxy based and lack end-to-end security. An end-to-end security strategy needs to encompass an increasingly complex technology chain, including mobile phones, laptops and PDAs from multiple venders, multiple operating systems, various network standards, wireless e-business applications, and IT management frameworks. Additionally companies need to be kept abreast of current and future risk in order to react efficiently and effectively with minimal disruption to service and quality. The approach to the security model based on XML is a secure and resilience solution design that meets the business security and privacy requirements. It fulfills the security issues such as authentication, integrity, confidentiality, non-repudiation, and availability required for mobile commerce using wireless devices. In addition, due to the features of XML and Java, it offers compatibility, extensibility, and flexibility. Fig. 1 The XML security model for secure mobile commerce. In this section, we ll present components for XML security for mobile commerce. Fig. 1 depicts the XML security model. It consists of XML signature module, XML encryption module and cryptography module. XML signature and XML encryption will be described based on XML digital signature specification and XML encryption specification by W3C, respectively because they have already defined as the international standards and we need to conform to them. Next, we ll discuss some implementation issues to bring them to wireless devices having relatively small system resources. 4.1 XML Signature XML signature aims to guarantee the integrity and authentication to any digital content including XML documents[6]. It allows generating and verifying a signature for the entire document or specific parts of it. In order to generate a signature, it is the first step that resources to be signed are accessed and appropriately transformed. For example, enveloped signature transform removes the signature structure from the document prior to digesting. Next, Reference elements that contain URI, Transform Method, Digest Method and Digest Value can be generated after message digests are computed over each entity. When multiple resources are signed together, Reference elements for each resource can be included in the SignedInfo directly or contained in the Manifest element. In the latter case, the Reference element for the Manifest is only included in the SignedInfo structure. A Manifest is a list of entity References along with their digests, just like the main SignedInfo structure. This Manifest is included within the signature structure and is signed by including a Reference to it within the main signed info structure. During verification, however, the References within the Manifest need not be verified. A recipient can check these References secondarily, if required. SignedInfo element is generated, containing Canonicalization Method information for SignedInfo itself, Signature Method information, Manifest, Signature Properties, Object and References for other resource. This element allows a signature recipient to ensure that no signed entity has been modified. The location information allows the recipient to locate the signed entity. A new message digest can then be computed over this entity and compared with the message digest in the SignedInfo. By the properties of cryptographic message digest algorithms, if the

4 document has changed, the message digest will have changed. Therefore, if the two match, the document has not changed from the time of signing. A digital signature is computed over this SignedInfo fragment using the signature method indicated by SignatureMethod element in the SignedInfo. Canonicalization has to be performed before the digital signature computation using the canonicalization method indicated by CanonicalizatonMethod element in the Signed Info. The digital signature allows the recipient to ensure that the signed info fragment has not changed and that the document was signed by a particular person. An XML signature element is produced, containing the SignedInfo element, the digital signature value and various additional pieces of information such as the signer's key information, Object element, etc. Verification of a signature thus involves both checking the digital signature on the signed info fragment and checking the message digest of each entity listed in the signed info. The verification of XML signature is processed by following flow. Resources are accessed for verification using the URI information in the corresponding Reference element. Then they are transformed using the transform algorithm specified in the Transform Method element in the Reference. Digest Values of the resources are computed using the digest algorithm specified in the Digest Method element in the corresponding Reference. Computed Digest Values are compared with the Signature Value in the SignedInfo element. All the References are verified in this way. SignedInfo is canonicalized using the algorithm specified in the Canonicalization Method element in the SignedInfo. The signature is verified. First the public key information is obtained from the KeyInfo element and the signature value of the SignedInfo is calculated using the signature algorithm specified in the Signature Method element. The value is compared with the value in the SignatureValue ele ment. Manifest is verified. Digest Values of each Reference in the Manifest are verified. The verification processing is up to application program. The processing flow of XML Signature is depicted in Fig.2. In this flow, the structure of XML Signature is conformed to that of XML Signature Draft. Fig. 2 The processing flow of XML signature generation and the structure of signature. 4.2 XML Encryption XML Encryption is a method whereby XML content can be transformed such that it is discernible only to the intended recipients and opaque to all others[7]. Similar with XML signature, XML encryption specification describes a process for encrypting and decrypting digital content (including XML documents and portions thereof) and an XML syntax used to represent the encrypted content and information that enables an intended recipient to decrypt it. In order to encrypt an XML document, it requires two-step encryption process. One is for documents to be sealed, and the other is for a secret key used in encryption of document. For first step encryption, most of all, it is necessary to generate a secret key using Pseudo-Random Number Generator. The other hand, an XML document is encoded in a stream of bytes and compressed. It has advantages of reducing the size of a ciphertext generated as a result and preventing attacker from getting information related with the plaintext. Next, the compressed byte stream is encrypted using a symmetric encryption algorithm and the secret key generated right before, and then the ciphertext bytes are encoded in an XML node. The second step encryption is for the secret key that is used in encrypting an XML document. It is encrypted using a particular recipient s public key. The ciphered secret key is also encoded in an XML

5 node and Ancillary information (such as the encryption algorithm used, etc) is encoded as further XML nodes. XML nodes generated previously are organized into a DTD-defined XML structure and returned to the caller. The following Table 1 summarizes the encryption process described right before. To unseal the encrypted document, first of all, the ancillary information is decoded to check what algorithm was used to encrypt the document. The recipient s private key is used to decrypt the embedded secret key contained within the XML document. The embedded XML ciphertext is decrypted using the selected symmetric encryption algorithm and the deciphered secret key. If the decrypted stream of bytes was compressed, it needs to be decompressed. Finally, the resulting stream of bytes is decoded back into an XML structure to form the nodes of the hierarchy. 4.3 Cryptography Algorithm In order to support XML signature and encryption, a cryptography library contains symmetric and asymmetric cipher algorithms, hash algorithms, digital signature algorithms, and key generation algorithms. The security services and cryptographic algorithms basically required are listed in Table 2. Table 1. The process of making an encrypted XML document. 1. Generate a symmetric key 2. Encode an XML document to byte stream 3. Compress byte stream Optional 4. Encrypt byte stream 5. Encode byte stream Base64 6. Encrypt the symmetric key with asymmetric key 7. Encode the encrypted the symmetric key with Base64 8. Encode the ancillary information Table. 2 The required security services and cryptographic algorithms by default. Cryptographic Security Services Algorithms Message Digest Block Cipher Cipher (Asymmetric) Signature SHA1, MD5 DES, DESede, AES RSA DSA 5 Implementation Issues In this section, we ll discuss some implementation issues to bring XML security to wireless devices having relatively poor system resources. 5.1 XML Parser We need to parse XML as part of J2ME application. As XML parsing, traditionally, is a relatively intensive task in terms of processing power and memory, we ll need to be careful in selecting a parser for a MIDP environment. To select a proper parser, we can consider following conditions. First, we can take an account its code is small and it doesn t take gobs of memory to parse a document. Small parsers for J2ME devices are evolving rapidly, and there are already nice choices of decent parsers that don t take up a lot of space, such as ASXMLP, kxml, MinXML, TinyXML and so on[8]. Second, we have to give up on running a validating parser in a MIDP environment. Validation is fairly intensive work, and the extra memory and processing requirements will reduce mobile phone to a smoldering heap of scrap metal before you can finish parsing a document. But we need not to give up on validation entirely it may still be useful during development cycle. We can use J2SE client with validating parsers to emulate our MIDP clients. We may well flush out bugs in XML documents this way. Once everything is running smoothly, switch over to the nonvalidating parsers in the MIDP clients. 5.2 Cryptographic Algorithm We need a cryptography package, which is organized so that it constrains a light- weight API suitable for use in mobile environment with the additional infrastructure to conform the algorithms to the JCE framework. Although J2ME provides a few security classes such as Cipher class, they can t be public for export clearance and are no open crypto APIs. Therefore we need to implement our own security service APIs and algorithms. Like XML parsing, cryptographic operations are intensive task in terms of processing power and memory. As one solution, we can consider exploring support for Elliptic Curve Cryptography (ECC). It provides a high level of security while demanding fewer computing and memory resources than other encryption approaches[9]. This is an important consideration for the small-footprint handheld devices.

6 In addition to this, we have to amortize the cost of expensive operations by reusing their results multiple times. 5.3 WPKI Although PKI is not the direct component of the XML security for wireless devices which we have proposed until now, we consider this mechanism as an indirect participant because it provides a set of technologies that relies on encryption and digital certificates for a digital signature. The certificates are message attachments, issued by a certificate authority, that authenticate a sender s identity and provide encryption keys. PKI is difficult to implement in the wireless world. Although there are several ways to accomplish them using variations of wireline PKI mechanism, the challenges have been designing PKI to work on devices with low throughput and computational power and developing wireless PKI systems that can interact with their wire line counterpart. There are several PKI products for wireless communications. Using technology from security venders such as Certicom, etrust, and VeriSign, Neomar is shipping a commercial wireless browser that can store and manage PKI keys[3]. 6 Concluding Remarks and Further Works In this paper, we have proposed the security model based on XML for secure mobile commerce. Because today s wireless architectures lack end-to-end security, a truly effective, future-proofed wireless security need to offer integrated technology, processes and organizational solutions. Extending XML security to wireless environment can meet all of the challenges required of wireless security. It provides end-to-end security by protecting data when they are not only transferred over the network, but also stored in wireless devices. Additionally, properties of XML and Java allow full compatibility with large installed base of secure web servers, extensibility, and flexibility. These are compelling reasons to consider XML security as for wireless device as the security solution for next generation smart phones or PDAs. Although we have proposed an end-to-end security solution for wireless devices, there are still many things to do. First, we have to develop a demo application for wireless devices, test its performance, and think of the reuse method to improve the performance. Careful implementations of Internet security have acceptable performance on today s wireless, mobile devices. References: [1] The wireless security acceleration team, End-to-end wireless security: Integrated solutions that protect your business and your customer, www-3.ibm.com/security/ index.shtml, Dec [2] S. K. Miller, Facing the challenge of wireless security, IEEE Computer, pp.16~18, July [3] PWH, E-Business Technology Forecast, PriceWaterHouse Coopers, May [4] Ovum, E-Business Security: New Directions and Successful Strategies, [5] S. Garfinkel and G. Spafford, Web Security & Commerce, O Reilly & Associates Inc., [6] IETF/W3C, XML-Signature Syntax and Processing (Working Draft), October 2000, / [7] IETF/W3C, XML-Encryption Syntax and Processing (Working Draft), March 2002, / [8] J. Knudsen, XML going wireless, XML Journel, vol. 2, issue. 11, Nov [9] J. Knudsen, Java Cryptography, O Reilly & Associates Inc., 1998.

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

XML Key Information System for Secure e-trading

XML Key Information System for Secure e-trading XML Key Information System for Secure e-trading Nam-Je Park, Ki-Young Moon, Sung-Won Sohn Informatoion Security Research Division Electronics Telecommunications Research Institute(ETRI) 161 Gajeong-dong,

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Security in ECE Systems

Security in ECE Systems Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

CS 425 / ECE 428 Distributed Systems Fall 2017

CS 425 / ECE 428 Distributed Systems Fall 2017 CS 425 / ECE 428 Distributed Systems Fall 2017 Indranil Gupta (Indy) Dec 5, 2017 Lecture 27: Security All slides IG Security Threats Leakage Unauthorized access to service or data E.g., Someone knows your

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

Oracle Tuxedo. Using Security in CORBA Applications 11g Release 1 ( ) March 2010

Oracle Tuxedo. Using Security in CORBA Applications 11g Release 1 ( ) March 2010 Oracle Tuxedo Using Security in CORBA Applications 11g Release 1 (11.1.1.1.0) March 2010 Oracle Tuxedo Using Security in CORBA Applications, 11g Release 1 (11.1.1.1.0) Copyright 1996, 2010, Oracle and/or

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

BlackBerry Enterprise Solution Security

BlackBerry Enterprise Solution Security Release 4.1 Technical Overview 2006 Research In Motion Limited. All rights reserved. Contents Wireless security... 4 BlackBerry Enterprise Solution security... 4 New security features...6 BlackBerry encryption

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Security: Cryptography

Security: Cryptography Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

NETWORK SECURITY & CRYPTOGRAPHY

NETWORK SECURITY & CRYPTOGRAPHY Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

M.SARAVANA KARTHIKEYAN

M.SARAVANA KARTHIKEYAN PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

Crypto meets Web Security: Certificates and SSL/TLS

Crypto meets Web Security: Certificates and SSL/TLS CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc. apple IEEE Std 1363-2000 and IEEE Std 1363a-2004 Ashley Butterworth Apple Inc. The Titles IEEE Std 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography IEED Std 1363a-2004 - IEEE Standard

More information

Kurose & Ross, Chapters (5 th ed.)

Kurose & Ross, Chapters (5 th ed.) Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and

More information

The Linux Kernel Cryptographic API

The Linux Kernel Cryptographic API Published on Linux Journal (http://www.linuxjournal.com) The Linux Kernel Cryptographic API By James Morris Created 2003-04-01 02:00 This article provides a brief overview of the new cryptographic API

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

PROTECTING CONVERSATIONS

PROTECTING CONVERSATIONS PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices. Abstract

Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices. Abstract Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices Neil Daswani Stanford University daswani@cs.stanford.edu Abstract This paper analyzes the cryptographic operation time that is required

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash

More information

Practical Aspects of Modern Cryptography

Practical Aspects of Modern Cryptography Practical Aspects of Modern Cryptography Lecture 3: Symmetric s and Hash Functions Josh Benaloh & Brian LaMacchia Meet Alice and Bob Alice Bob Message Modern Symmetric s Setup: Alice wants to send a private

More information

Keys to the Success of Mobile Commerce

Keys to the Success of Mobile Commerce Keys to the Success of Mobile Commerce Security, Performance, Usability and Practical Business Applications Marty Andolino Introduction to Mobile Commerce Evaluation Security Performance Usability Practical

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class 1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and

More information

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005 Chapter 7: Security From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4 Introduction Security policies Provide for the sharing of resources within specified limits

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

Summary on Crypto Primitives and Protocols

Summary on Crypto Primitives and Protocols Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance

More information

Lecture III : Communication Security Mechanisms

Lecture III : Communication Security Mechanisms Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai Elliptic Curve Cryptography (ECC) based Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai 14th November, 2017 Focus of this talk What should

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Lecture 12 Page 1. Lecture 12 Page 3

Lecture 12 Page 1. Lecture 12 Page 3 IPsec Network Security: IPsec CS 239 Computer Software February 26, 2003 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS. Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,

More information

ipad in Business Security Overview

ipad in Business Security Overview ipad in Business Security Overview ipad can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for

More information

Grenzen der Kryptographie

Grenzen der Kryptographie Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate

More information

Securing Internet Communication: TLS

Securing Internet Communication: TLS Securing Internet Communication: TLS CS 161: Computer Security Prof. David Wagner March 11, 2016 Today s Lecture Applying crypto technology in practice Two simple abstractions cover 80% of the use cases

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

Chapter 19 Security. Chapter 19 Security

Chapter 19 Security. Chapter 19 Security Chapter 19 Security Outline 19.1 Introduction 19.2 Cryptography 19.2.1 Secret-Key Cryptography 19.2.2 Public-Key Cryptography 19.3 Authentication 19.3.1 Basic Authentication 19.3.2 Biometrics and Smart

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals This course contains copyrighted material used by permission of Logical Operations, Inc. Slide 1 Course 01: Security Fundamentals The Information

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS COSC 301 Network Management Lecture 15: SSL/TLS and HTTPS Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 15: SSL/TLS and HTTPS 1 Today s Focus WWW WWW How to secure web applications?

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Lesson 13 Securing Web Services (WS-Security, SAML)

Lesson 13 Securing Web Services (WS-Security, SAML) Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element

More information

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

ח'/סיון/תשע א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption

More information

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable? Introduction Controlling Information Systems When computer systems fail to work as required, firms that depend heavily on them experience a serious loss of business function. M7011 Peter Lo 2005 1 M7011

More information

Improving the Security of Workflow-based System using Multiple XML Digital Signature

Improving the Security of Workflow-based System using Multiple XML Digital Signature www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Page No. 13881-13886 Improving the Security of Workflow-based System using Multiple XML

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar. Saint Leo University COM 450- Network Defense and Security Instructor: Dr. Omar Group members: Ivanna, Tracey, Romario, Chevon March 13, 2018 Abstract This paper will look at different aspects of Cryptography,

More information

Cryptography. Seminar report. Submitted in partial fulfillment of the requirement for the award of degree. Of Computer Science

Cryptography. Seminar report.  Submitted in partial fulfillment of the requirement for the award of degree. Of Computer Science www.studymafia.org A Seminar report on Cryptography Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.com www.studymafia.com

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

ETSI TS V7.1.0 ( )

ETSI TS V7.1.0 ( ) TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Using Cryptography CMSC 414. October 16, 2017

Using Cryptography CMSC 414. October 16, 2017 Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using

More information