TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS
|
|
- Dana Rodgers
- 6 years ago
- Views:
Transcription
1 vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS iii xiii xv xviii 1 INTRODUCTION OVERVIEW MOBILE AGENT Mobile Agent System Components MOBILE AGENT DATA STRUCTURE MOBILE AGENT LIFE CYCLE TYPES OF MOBILE AGENT Host Count Itinerary Mobility of Mobile Agents Implementation Strategies MOBILE AGENT SECURITY Host Security Agent Security GENERAL THREATS IN A MOBILE AGENT SYSTEM THREATS TO THE DATA OF FREE ROAMING MOBILE AGENTS 20
2 viii CHAPTER NO. TITLE PAGE NO. 1.9 SECURITY REQUIRMENTS MOTIVATION OBJECTIVES ACCOMPLISHMENTS AND CONTRIBUTIONS ASSUMPTIONS OF THE THESIS ORGANIZATION OF THE THESIS 29 2 RELATED WORKS AND LITERATURE SURVEY INTRODUCTION Detection Mechanism Avoiding Mechanism MOBILE AGENT PLATFORM PROTECTION Software-based Fault Isolation or Sandboxing Safe Code Interpretation Code Signing Path History Proof Carrying Code Policy based Model to Protect the Platform MOBILE AGENT PROTECTION Code Obfuscation State Appraisal Digital Signatures Execution Tracing Mutual Itinerary Recording Replication and Voting Encrypted Functions Environment Key Generation 47
3 ix CHAPTER NO. TITLE PAGE NO Code on Demand Factor of Time Additional Models MOBILE AGENT DATA PROTECTION Partial Result Authentication Codes Chain Relation Method Trusted Third Party Multi-Agent based Data Protection Trust Models Watermarking Model MOBILE AGENT RECOVERY Blocking Attack OPEN ISSUES IN A MOBILE AGENT SECURITY ENVIRONMENT SUMMARY 64 3 TRUST AND REPUTATION MANAGEMENT INTRODUCTION SECURITY PROPERTIES REQUIREMENTS FOR SECURITY PROPERTIES Assumptions MALICIOUS HOST IDENTIFIER Trust-based Routing Table Construction Routing table Derivation of the TRV Secure path selection Secure Information Retrieval 74
4 x CHAPTER NO. TITLE PAGE NO Cost Assessment Metric Assessment EXPERIMENTAL RESULTS Experimental Setup Analysis of the Routing Table Construction Malicious Host Identification Using TRM Analysis Secure Information Retrieval Performance Evaluation Effect of varying the number of hosts on turnaround time Effect of varying the size of information retrieved SECURITY ANALYSIS SUMMARY 90 4 REVERSE RETUNING METHOD INTRODUCTION Security Requirements Assumptions DATA VERIFIER EXPERIMENTAL RESULTS COMPARISON WITH THE EXISTING MODELS COMPLEXITY MITIGATION OF RRM ALGORITHM FORMAL PROOF OF THE SECURITY PROPERTIES Multiple Colluded Attacks 111
5 xi CHAPTER NO. TITLE PAGE NO. 4.7 SUMMARY DATA INTEGRITY CHECKER INTRODUCTION Attack Scenarios Protection Models Protection against passive attack Protection against alteration attack Assumptions CUSTOMIZED ROOT CANAL ALGORITHM Creation of Agent at Originator Agent Execution at Remote Host Code integrity verification Data integrity verification Data collection and digital signature Agent Execution at the Last Remote Host Agent Reporting to the Originator EXPERIMENTAL RESULTS Experimental Setup Results of the CRC Algorithm COMPARISON WITH THE EXISTING SCHEMES Comparison of the CRC with the RC and XRC Algorithms SECURITY ANALYSIS SUMMARY 140
6 xii CHAPTER NO. TITLE PAGE NO. 6 THRESHOLD RESPONSE RECOVERY INTRODUCTION EXISTING MODELS AND ITS ISSUES DATA RECOVERY Data Size as Threshold Host Count as Threshold Execution Time as Threshold TRR MODEL AGAINST COLLUDED TRUNCATION ATTACKS ATTACK DYNAMICS COST EVALUATION EXPERIMENTAL RESULT ANALYSIS Effect of Varying the Total Number of Visited Hosts Analysis of the TRR with Hop Count Analysis of the TRR with the Data Size Analysis of the TRR with Execution Time SUMMARY CONCLUSION AND FUTURE ENHANCEMENTS SUMMARY OF WORK DONE FUTURE ENHANCEMENTS 164 REFERENCES 166 LIST OF PUBLICATIONS 180 CURRIRULUM VITAE 181
7 xiii LIST OF TABLES TABLE NO. TITLE PAGE NO. 1.1 Comparison of Mobile Agent Technology with Traditional Methods Components in a Mobile Agent Types of Attacks and Threats on Mobile Agent Systems Drawbacks of the Existing Agent Platform Protection Models Drawbacks of the Existing Agent Protection Models Initial Trust-based Routing Table Trust value of Remote Hosts Malicious Host Identification for M=N/ Malicious Host Identification for M<N/ Size of the Retrieved Data, Byte code and Processing Time in TRM Processing Time of the Agent at the Servers Complexity Comparison of the Existing Models and Proposed Model at the n th Host for n number of data Complexity Comparison of the Existing Models and Proposed Model for N Hosts Comparison of Attack Protection between the Existing Models and Proposed Model Processing Time of the CRC Algorithm Computational Complexity Comparison of the Existing Algorithms and Proposed Algorithm 132
8 xiv TABLE NO. TITLE PAGE NO. 5.3 Comparison of the CRC Algorithms with the Existing Schemes Computational Time Difference between the Existing Schemes and the Proposed Algorithm in RH Processing Time Difference between the CRC, and the RC and XRC Algorithms in RH Comparison of the Secure Hash Algorithms in CRC Algorithm Address Verification in the CRC Algorithm Number of Responses based on the Threshold Value Observed Cost of Agent Visit with the TRR Model Responses with Respect to the Data Size Responses with Respect to the Execution Time Comparisons between the Existing Methods and Proposed Methods 164
9 xv LIST OF FIGURES FIGURE NO. TITLE PAGE NO. 1.1 Mobile Agent Technology - A Overview Mobile Agent System Model Life Cycle of a Mobile Agent Single Hop Mobile Agent Multi Hop Mobile Agent Classification of the Mobile Agent System Security Free Roaming Mobile Agent Migrations Mobile Agent Migrations with Colluded Attack Mobile Agent Migrations with Colluded Truncation Attack Mobile Agent Migrations with Stemming Attack Existing Models to Protect the Mobile Agent Environment Routing Table Construction TRM Data Protection Algorithm Secure Information Retrieval Cost of Constructing the Trust-based Routing Time Cost for Secure Information Retrieval Effect of Total Turnaround Time Effect of varying the Size of Information Retrieved Agent Migrations without Colluded Truncation Attack in TRM Data Protection of the Free Roaming Mobile Agent using RRM 94
10 xvi FIGURE NO. TITLE PAGE NO. 4.2 Function of the DCMA at the originator (S 0 ) Function of the DCMA at the Server (S 1 ) Function of the DCMA at the Server (S i ) Function of the DCMA at the Server (S n ) Function of the DCMA at the Originator for Computation Function of the DRMA at the Server (S x ) Function of the DRMA at the Server (S x+1 ) Function of the DRMA at the Server S i Function of the DRMA at the Originator after Verification Processing Time of the RRM Algorithm Identification of the Revisiting Attack using RRM Algorithm in Server (S i ) Organs of the Mobile Agent Platform to Agent Attack Platform to Agent to Platform Attack Protection of Mobile Agent Code Functional Diagram of the CRC Algorithm CRC Algorithm at the Originator (S 0 ) CRC Algorithm at the server S i CRC Algorithm at the server S n CRC Algorithm at the Originator after Migrations Snapshot of the Byte Code without Data Protection Snapshot of the Byte Code with Data Protection 138
11 xvii FIGURE NO. TITLE PAGE NO. 6.1 Threshold Response Recovery Algorithm Flowchart of Threshold Response Recovery TRR Algorithm: Data Size as Threshold TRR Model against Network Failure TRR Algorithm: Hop Count as Threshold TRR Algorithm: Execution Time as Threshold TRR against Colluded Truncation Attacks Effect of Varying the Total Number of Visited Hosts Effect of Varying the Threshold Hop Count Effect of Varying the Threshold Data Size Effect of Varying the Threshold Time 161
12 xviii LIST OF SYMBOLS AND ABBREVIATIONS Symbols d i - Agent data at i th host AH - Agent home AG i. - Agent itinerary P(E(f)) - Agent Program which implements E(f) f - Agent with function i - Arrival time at i th host D 0 - Computed offer from S 0 (Originator), - Constants - Delay time i - Departure time at i th host EC PU0 (x) - ECC encryption using public key or E pu D i - Encapsulated data collected at S i EH code - Encrypted hash code foe mobile code at i th host RD - Encrypted data concatenated with hash value (Return data) or signature E(f) - Encryption function ED - Enhanced data e i - Entry at the i th host t exe i - Execution time at S i t f - Fault-tolerant execution time RH code - Hash code or Hash value generated at the remote host for the agent byte code H code - Hash code or Hash value of the agent byte code H(m) - Hash function H i ( x) - Hash function at the i th host. S - Host (or) Server (or) Server identity S 0 - Host of agent Originator or Creator or Owner
13 xix rd i - Intermediate data at at the i th host S i - i th host where the agent currently residing Msg - Message Dec (PR Si, M) - Message M is decrypted with the private key PR Si of S i. Enc(PU Si, M) - Message M is encrypted with the public key PU Si of S i. S i S i+1 - Migration of agent from S i to S i+1 or h i to h i+1 x - Number of host where information retrieved M - Number of malicious host in the network K - Number of responses required from the succeeding hosts OD i - Out data from the host S i PR i - Private key of the i th host P i - Processing time at the i th host PU i - Public key of the i th host RH - Remote Host RV i - Reputation value of the i th host. R pr - RSA decryption using private key. R pu - RSA decryption using public key. Shadow home - Shadow of agent at home Sig Pri (m) - Signature of S i on message m with its private key Pr i. or Sig PRi (x) SA code - Size of the agent code SAH code - Size of the agent encrypted hash code SAH data - Size of the agent encrypted hash data SH code - Size of the agent hash code SH data - Size of the agent hashed data Q - Size of the information retrieved - Threshold value for Data size - Threshold value for execution time - Threshold value for host count t i - Time taken to travel from the i th host t tra i - Time taken to travel from S i-1 to S i
14 xx t DAS - Time to decrypt the agent code and its signature t DSC - Time to decrypt the symmetric key and control code t EAS - Time to encrypt the agent code and the signature of the agent code t ESC - Time to encrypt the symmetric key and control code t HC - Time to generate the hash code form the control code t SA - Time to generate the signature for the agent code t SAD - Time to generate the signature for the agent data t - Time to process the information t SSA - Time to sign in the signature of the originator Tt i - Time to travel to the i th host t VC - Time to verify the control code t VS - Time to verify the signature t VSS - Time to verify the signature of code at the intermediate remote hosts t VSD - Time to verify the signature of data at the intermediate remote hosts t tot - Total execution time N - Total number of hosts agent need to visit or Number of neighbour hosts t - Total time to construct trust-based routing table t - Total time to retrieve the information Tt - Total time to travel to the host T - Total turnaround time TRV i - Trust and Reputation value of the i th host. TV i - Trust value of the i th host
15 xxi Abbreviations ACCK - Algesheimer Cachin Camenisch Karjoth AFDB - Address Forward and Data Backward AIK - Attestation Identity Keys AST - Anti Spam Technique ATP - Agent Transfer Protocol CoD - Code on Demand CORBA Common Object Request Broker Architecture CPU - Central Processing Unit CRC - Customized Root Canal DCMA - Data Computing Mobile Agent DIC - Data Integrity Checker DoS - Denial of Service DRMA - Data Retuning Mobile Agent ECC - Elliptic Curve Cryptography HC - Host Count or Hop Count ISTCM - Improvement of Signature Trust Chain Mechanism KAG - Karjoth Asokan Gulcu LAN - Local Area Network MAC - Message Authentication codes MARISM-A - Mobile Agents with Recursive Itinerary and Secure Integration - Architecture MASIF - Mobile Agent System Interoperability Facility MIP - Malicious Identification Police OT - Oblivious Transfer PAC - Privilege Attribute Certificate PCR - Platform Configure Registers PRAC - Partial Result Authentication Codes RC - Root Canal
16 xxii RPC - Remote Procedure Call RRM - Reverse Return Method RSA - Rivest Shamir Adleman SA - Secondary Agent SeMoA - Secure Mobile Agent SESAME - Secure European System for Applications in a Multi-vendor Environment SHA - Secure Hash Algorithm STCM - Signature Trust Chain Mechanism TA - Task Agent Tcl - Tool Command Language TPM - Trusted Platform Module TRM - Trust and Reputation Management TRR - Threshold Response Recovery TTP - Trusted Third Party XAST - extended Anti Spam Technique XRC - extended Root Canal
TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO.
vii TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATION iii xii xiv xvii 1 INTRODUCTION 1 1.1 GENERAL 1 1.2 TYPES OF WIRELESS COMMUNICATION
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM
More informationForeword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1
Brief Contents Foreword by Katie Moussouris.... xv Acknowledgments... xvii Introduction...xix Chapter 1: The Basics of Networking... 1 Chapter 2: Capturing Application Traffic... 11 Chapter 3: Network
More informationInstalling and Administering a Satellite Environment
IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00
More informationTABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi
ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification
More informationIntelligent Terminal System Based on Trusted Platform Module
American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationLecture Embedded System Security Trusted Platform Module
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture
More informationCryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption
and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X
More informationSecurity Protections for Mobile Agents
Stephen R. Tate Dept. of Computer Science and Engineering University of North Texas Talk describes joint work with Ke Xu and Vandana Gunupudi Research supported by the National Science Foundation class
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation
More informationGarantía y Seguridad en Sistemas y Redes
Garantía y Seguridad en Sistemas y Redes Tema 2. Cryptographic Tools Esteban Stafford Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve Commons BY- NC- SA
More informationSecuring Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh
Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party
More informationS e c u re M o b i l e A g e n t s i n J A D E
S e c u re M o b i l e A g e n t s i n J A D E Francesco Librizzi The 2006 miniworkshop on Security Frameworks - Security in Mobility - What s Jade? JADE: Java Agent DEvelopment Framework; It represents
More informationCS 425 / ECE 428 Distributed Systems Fall 2017
CS 425 / ECE 428 Distributed Systems Fall 2017 Indranil Gupta (Indy) Dec 5, 2017 Lecture 27: Security All slides IG Security Threats Leakage Unauthorized access to service or data E.g., Someone knows your
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationCIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:
CIS 21 Final Study Guide Final covers ch. 1-20, except for 17. Need to know: I. Amdahl's Law II. Moore s Law III. Processes and Threading A. What is a process? B. What is a thread? C. Modes (kernel mode,
More informationMathematics Shape and Space: Polygon Angles
a place of mind F A C U L T Y O F E D U C A T I O N Department of Curriculum and Pedagogy Mathematics Shape and Space: Polygon Angles Science and Mathematics Education Research Group Supported by UBC Teaching
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationConfiguring BGP on Cisco Routers Volume 1
Volume 1 I. Course Introduction A. Overview/Learner Skills and Knowledge B. Course Flow C. Additional References 1. Cisco Glossary of Terms D. Your Training Curriculum II. BGP Overview III. Introducing
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2007 Goals Understand: authenticated booting the difference
More informationRequirements for Model Validation
Draft Need Requirements Application for Model Validation Reporting Requirements for Model Validation Reporting for Generators and Generator Control Systems Revision 0 Wednesday 16 November 2005 Prepared
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationSystem Administration of PTC Windchill 11.0
System Administration of PTC Windchill 11.0 Overview Course Code Course Length TRN-4830-T 16 Hours In this course, you will gain an understanding of how to perform routine Windchill system administration
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationLecture 2 Applied Cryptography (Part 2)
Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2
More informationCOPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51
Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual
More informationMessage authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:
Message authentication and secure hashing Why message authentication To prevent against: Masquerade/impersonation Modification of message content Modification of message sequence Acceptance of replayed/delayed
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationCONTENTS. Computer-System Structures
CONTENTS PART ONE OVERVIEW Chapter 1 Introduction 1.1 What Is an Operating System? 3 1.2 Simple Batch Systems 6 1.3 Multiprogrammed Batched Systems 8 1.4 Time-Sharing Systems 9 1.5 Personal-Computer Systems
More informationIEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.
apple IEEE Std 1363-2000 and IEEE Std 1363a-2004 Ashley Butterworth Apple Inc. The Titles IEEE Std 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography IEED Std 1363a-2004 - IEEE Standard
More informationContents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE
Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2009 Goals Understand principles of: authenticated booting the
More informationOracle Exadata Recipes
Oracle Exadata Recipes A Problem-Solution Approach John Clarke Apress- Contents About the Author About the Technical Reviewer Acknowledgments Introduction xxxiii xxxv xxxvii xxxix Part 1: Exadata Architecture
More informationSecurity Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
An abridged version of this paper appears in the Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island,
More informationAnnexure I: Contact Details:
Ref: CO/IT-BPR/CSC Date:.09.2017 Annexure I: Contact Details: a) Name of the company b) Company s address in India c) Contact person d) Telephone no. e) Fax f) E-mail address g) Service tax registration
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationCryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols
Cryptography and Network Security Chapter 13 Digital Signatures & Authentication Protocols Digital Signatures have looked at message authentication but does not address issues of lack of trust digital
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More informationUNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 10 Digital Signatures Israel Koren ECE597/697 Koren Part.10.1 Content of this part
More informationThe most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who
1 The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who exchange messages from any third party. However, it does
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationCSC 6575: Internet Security Fall 2017
CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture
More informationDistributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing
Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 30/05/11 Goals Understand principles of: Authenticated booting The difference to (closed) secure
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationCryptography and Network Security Chapter 16. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,
More informationSecure digital certificates with a blockchain protocol
Secure digital certificates with a blockchain protocol Federico Pintore 1 Trento, 10 th February 2017 1 University of Trento Federico Pintore Blockchain and innovative applications Trento, 10 th February
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationOS Security IV: Virtualization and Trusted Computing
1 OS Security IV: Virtualization and Trusted Computing Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 More questions? 3 Virtual machine monitor +-----------+----------------+-------------+
More informationExam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo
Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.
More informationCSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationIntroduction to PTC Windchill ProjectLink 11.0
Introduction to PTC Windchill ProjectLink 11.0 Overview Course Code Course Length TRN-4756-T 8 Hours In this course, you will learn how to participate in and manage projects using Windchill ProjectLink
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE NO NO.
vi TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. ABSTRACT iii LIST OF TABLES xiii LIST OF FIGURES xiv LIST OF SYMBOLS AND ABBREVIATIONS xix 1 INTRODUCTION 1 1.1 CLOUD COMPUTING 1 1.1.1 Introduction to Cloud
More informationOPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL
OPTIMIZING ONE FAIR DOCUMENT EXCHANGE PROTOCOL Abdullah M. Alaraj Department of IT, Computer College, Qassim University, Saudi Arabia arj@qu.edu.sa ABSTRACT This paper presents an efficient fair document
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationOutline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationCITY UNIVERSITY OF NEW YORK. i. Visit:
CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationTrusted Computing: Introduction & Applications
Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,
More informationKey Agreement Schemes
Key Agreement Schemes CSG 252 Lecture 9 November 25, 2008 Riccardo Pucella Key Establishment Problem PK cryptosystems have advantages over SK cryptosystems PKCs do not need a secure channel to establish
More informationFónfix Repair Logging System
Fónfix Repair Logging System Fónfix have developed a new web-based Repair System for Stores. The new system will be held on the Fónfix server and will be managed and maintained by Fónfix. To access the
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Trusted Platform Module Part 2: Design principles
INTERNATIONAL STANDARD ISO/IEC 11889-2 First edition 2009-05-15 Information technology Trusted Platform Module Part 2: Design principles Technologies de l'information Module de plate-forme de confiance
More informationSecurity Standards for Information Systems
Security Standards for Information Systems Area: Information Technology Services Number: IT-3610-00 Subject: Information Systems Management Issued: 8/1/2012 Applies To: University Revised: 4/1/2015 Sources:
More informationCertificate Program. Introduction to Microsoft Excel 2013
Certificate Program We offer online education programs designed to provide the workforce skills necessary to enter a new field or advance your current career. Our Online Career Training Programs in the
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationBackground. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33
Background Network Security - Certificates, Keys and Signatures - Dr. John Keeney 3BA33 Slides Sources: Karl Quinn, Donal O Mahoney, Henric Johnson, Charlie Kaufman, Wikipedia, Google, Brian Raiter. Recommended
More informationPart VI. Public-key cryptography
Part VI Public-key cryptography Drawbacks with symmetric-key cryptography Symmetric-key cryptography: Communicating parties a priori share some secret information. Secure Channel Alice Unsecured Channel
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationContents Digital Signatures Digital Signature Properties Direct Digital Signatures
Contents Digital Signatures... 197 Digital Signature Properties... 198 Direct Digital Signatures... 198 199...قابلداوری Arbitrated Digital Signatures Arbitrated Digital Signature Technaiques... 200 Authentication
More informationZeeshan Naseh, CCIE No Haroon Khan, CCIE No. 4530
Desi So! itching s Zeeshan Naseh, CCIE No. 6838 Haroon Khan, CCIE No. 4530 Cisco Press 800 Eas Indianapolis, Indiana Table of Contents Foreword Introduction xxv xxvi Part I Server Load Balancing (SLB)
More informationSecurity Issues in Mobile Agents
M.Tech. Dissertation Security Issues in Mobile Agents Submitted in partial fulfillment of requirements for the degree of Master of Technology By E. C. Vijil Roll No. : 00329014 Under the guidance of Prof.
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationMechanism Design using Creo Parametric 3.0
Mechanism Design using Creo Parametric 3.0 Overview Course Code Course Length TRN-4521-T 1 Day In this course, you will learn about creating mechanism connections, configuring the mechanism model, creating
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationVMware - vsphere INSTALL & CONFIGURE BEYOND INTRODUCTION V1.3
VMware - vsphere INSTALL & CONFIGURE BEYOND INTRODUCTION V1.3 A complete course for all beginning and intermediate students with over 70% of all materials devoted to Live Labs. Students will complete the
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationDanube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl
Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks Thilo Sauter Albert Treytl Wireless Sensor Network Vision High-level company functions
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationSoftware Vulnerability Assessment & Secure Storage
Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices
More informationKnowledge libraries and information space
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Knowledge libraries and information space Eric Rayner University
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More information